메뉴 건너뛰기




Volumn 64, Issue 1, 2015, Pages 139-151

Fool me if you can: Mimicking attacks and anti-attacks in cyberspace

Author keywords

detection; flash crowd attack; Mimicking; second order metrics

Indexed keywords

COMPUTERS; ERROR DETECTION; MARKOV PROCESSES; SOCIAL NETWORKING (ONLINE); VIRTUAL REALITY;

EID: 84919476166     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2013.191     Document Type: Article
Times cited : (67)

References (49)
  • 1
    • 34147099073 scopus 로고    scopus 로고
    • Survey of networkbased defense mechanisms countering the DOS and DDoS problems
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of networkbased defense mechanisms countering the DOS and DDoS problems," ACM Comput. Surv., vol. 39, no. 1, 2007.
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 2
    • 77955872093 scopus 로고    scopus 로고
    • On anonymity in an electronic society: A survey of anonymous communication systems
    • M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Comput. Surv., vol. 42, no. 1, 2009.
    • (2009) ACM Comput. Surv. , vol.42 , Issue.1
    • Edman, M.1    Yener, B.2
  • 4
    • 79951817047 scopus 로고    scopus 로고
    • Towards situational awareness of large-scale botnet probing events
    • Mar.
    • Z. Li, A. Goyal, Y. Chen, and V. Paxson, "Towards situational awareness of large-scale botnet probing events," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 175-188, Mar. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 175-188
    • Li, Z.1    Goyal, A.2    Chen, Y.3    Paxson, V.4
  • 5
    • 84857360605 scopus 로고    scopus 로고
    • Abnormally malicious autonomous systems and their internet connectivity
    • Feb.
    • C. A. Shue, A. J. Kalafut, and M. Gupta, "Abnormally malicious autonomous systems and their internet connectivity," IEEE/ACM Trans. Netw., vol. 20, no. 1, pp. 220-230, Feb. 2012.
    • (2012) IEEE/ACM Trans. Netw. , vol.20 , Issue.1 , pp. 220-230
    • Shue, C.A.1    Kalafut, A.J.2    Gupta, M.3
  • 9
    • 36249008514 scopus 로고    scopus 로고
    • A survey of bots used for distributed denial of service attacks
    • V. L. L. Thing, M. Sloman, and N. Dulay, "A survey of bots used for distributed denial of service attacks," in SEC, 2007, pp. 229-240.
    • (2007) SEC , pp. 229-240
    • Thing, V.L.L.1    Sloman, M.2    Dulay, N.3
  • 11
    • 77952687808 scopus 로고    scopus 로고
    • An advanced hybrid peer-topeer botnet
    • Mar./Apr.
    • P. Wang, S. Sparks, and C. C. Zou, "An advanced hybrid peer-topeer botnet," IEEE Trans. Dependable Secure Comput., vol. 7, no. 2, pp. 113-127, Mar./Apr. 2010.
    • (2010) IEEE Trans. Dependable Secure Comput. , vol.7 , Issue.2 , pp. 113-127
    • Wang, P.1    Sparks, S.2    Zou, C.C.3
  • 13
    • 58149490850 scopus 로고    scopus 로고
    • Information theory based detection against network behavior mimicking DDoS attack
    • Apr.
    • S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking DDoS attack," IEEE Commun. Lett., vol. 12, no. 4, pp. 319-321, Apr. 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.4 , pp. 319-321
    • Yu, S.1    Zhou, W.2    Doss, R.3
  • 14
    • 33847761464 scopus 로고    scopus 로고
    • Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies
    • Jan./Mar.
    • A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies," IEEE Trans. Dependable Secure Comput., vol. 4, no. 1, pp. 56-70, Jan./Mar. 2007.
    • (2007) IEEE Trans. Dependable Secure Comput. , vol.4 , Issue.1 , pp. 56-70
    • Scherrer, A.1    Larrieu, N.2    Owezarski, P.3    Borgnat, P.4    Abry, P.5
  • 16
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites," in Proc. World Wide Web (WWW), 2002, pp. 252-262.
    • (2002) Proc. World Wide Web (WWW) , pp. 252-262
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 17
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-service attack-detection techniques
    • Jan./Feb.
    • G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attack-detection techniques," IEEE Internet Comput., vol. 10, no. 1, pp. 82-89, Jan./Feb. 2006.
    • (2006) IEEE Internet Comput. , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.3    Rai, S.4
  • 18
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis," J. Parallel Distrib. Comput., vol. 66, no. 9, pp. 1137-1151, 2006.
    • (2006) J. Parallel Distrib. Comput. , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 20
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Feb.
    • Y. Xie and S.-Z. Yu, "A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors," IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 54-65, Feb. 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.-Z.2
  • 21
    • 84864147184 scopus 로고    scopus 로고
    • Prediction of user's web-browsing behavior: Application of Markov model
    • Feb.
    • M. A. Awad and I. Khalil, "Prediction of user's web-browsing behavior: Application of Markov model," IEEE Trans. Syst. Man Cybern. B, vol. 42, no. 4, pp. 1131-1142, Feb. 2012.
    • (2012) IEEE Trans. Syst. Man Cybern. B , vol.42 , Issue.4 , pp. 1131-1142
    • Awad, M.A.1    Khalil, I.2
  • 23
  • 24
    • 33947425424 scopus 로고    scopus 로고
    • Citations and the Zipf-Mandelbrot's law
    • Z. K. Silagadze, "Citations and the Zipf-Mandelbrot's law," Complex Syst., vol. 11, p. 487, 1997.
    • (1997) Complex Syst. , vol.11 , pp. 487
    • Silagadze, Z.K.1
  • 25
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • M. E. Crovella and A. Bestavros, "Self-similarity in world wide web traffic: Evidence and possible causes," IEEE/ACM Trans. Netw., vol. 5, no. 6, pp. 835-846, 1997.
    • (1997) IEEE/ACM Trans. Netw. , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 29
    • 84896324406 scopus 로고    scopus 로고
    • WorldCup98 [Online]. Available: http://ita.ee.lbl.gov/html/contrib/WorldCup.html
    • World Cup 98
  • 32
    • 39049125624 scopus 로고    scopus 로고
    • Controlling IP spoofing through interdomain packet filters
    • Jan./Mar.
    • Z. Duan, X. Yuan, and J. Chandrashekar, "Controlling IP spoofing through interdomain packet filters," IEEE Trans. Dependable Secure Comput., vol. 5, no. 1, pp. 22-36, Jan./Mar. 2008.
    • (2008) IEEE Trans. Dependable Secure Comput. , vol.5 , Issue.1 , pp. 22-36
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 33
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • Feb.
    • H. Wang, C. Jin, and K. G. Shin, "Defense against spoofed IP traffic using hop-count filtering," IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 40-53, Feb. 2007.
    • (2007) IEEE/ACM Trans. Netw. , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 34
    • 33646742035 scopus 로고    scopus 로고
    • Packetscore: A statistics-based packet filtering scheme against distributed denialof-service attacks
    • Apr./Jun.
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "Packetscore: A statistics-based packet filtering scheme against distributed denialof-service attacks," IEEE Trans. Dependable Secure Comput., vol. 3, no. 2, pp. 141-155, Apr./Jun. 2006.
    • (2006) IEEE Trans. Dependable Secure Comput. , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 36
    • 71749083441 scopus 로고    scopus 로고
    • Collaborative detection of fast flux phishing domains
    • C. V. Zhou, C. Leckie, and S. Karunasekera, "Collaborative detection of fast flux phishing domains," J. Netw., vol. 4, no. 1, pp. 75-84, 2009.
    • (2009) J. Netw. , vol.4 , Issue.1 , pp. 75-84
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 40
    • 57949085517 scopus 로고    scopus 로고
    • Traffic modeling and proportional partial caching for peer-to-peer systems
    • Dec.
    • M. Hefeeda and O. Saleh, "Traffic modeling and proportional partial caching for peer-to-peer systems," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1447-1460, Dec. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.6 , pp. 1447-1460
    • Hefeeda, M.1    Saleh, O.2
  • 41
    • 79960601554 scopus 로고    scopus 로고
    • A brief history of generative models for power law and lognornal distributions
    • M. Mitzenmacher, "A brief history of generative models for power law and lognornal distributions," Internet Math., vol. 1, 2004.
    • (2004) Internet Math. , vol.1
    • Mitzenmacher, M.1
  • 42
    • 3042550642 scopus 로고    scopus 로고
    • The double pareto-lognormal distribution-A new parametric model for size distributions
    • W. J. Reed and M. Jorgensen, "The double pareto-lognormal distribution-A new parametric model for size distributions," Commun. Stat. Theory Methods, vol. 33, no. 8, pp. 1733-1753, 2003.
    • (2003) Commun. Stat. Theory Methods , vol.33 , Issue.8 , pp. 1733-1753
    • Reed, W.J.1    Jorgensen, M.2
  • 44
    • 36249029853 scopus 로고    scopus 로고
    • Correntropy: Properties and applications in non-Gaussian signal processing
    • Nov.
    • W. Liu, P. P. Pokharel, and J. C. Principe, "Correntropy: Properties and applications in non-Gaussian signal processing," IEEE Trans. Signal Process., vol. 55, no. 11, pp. 5286-5298, Nov. 2007.
    • (2007) IEEE Trans. Signal Process. , vol.55 , Issue.11 , pp. 5286-5298
    • Liu, W.1    Pokharel, P.P.2    Principe, J.C.3
  • 45
    • 79959526388 scopus 로고    scopus 로고
    • Maximum correntropy criterion for robust face recognition
    • Aug.
    • R. He, W.-S. Zheng, and B.-G. Hu, "Maximum correntropy criterion for robust face recognition," IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 8, pp. 1561-1576, Aug. 2011.
    • (2011) IEEE Trans. Pattern Anal. Mach. Intell. , vol.33 , Issue.8 , pp. 1561-1576
    • He, R.1    Zheng, W.-S.2    Hu, B.-G.3
  • 46
    • 27544453628 scopus 로고    scopus 로고
    • User centric walk: An integrated approach for modeling the browsing behavior of users on the web
    • S. Burklen, P. J. Marron, S. Fritsch, and K. Rothermel, "User centric walk: An integrated approach for modeling the browsing behavior of users on the web," in Proc. 38th Annu. Symp. Simul. (ANSS'05), 2005 pp. 149-159.
    • (2005) Proc. 38th Annu. Symp. Simul. (ANSS'05) , pp. 149-159
    • Burklen, S.1    Marron, P.J.2    Fritsch, S.3    Rothermel, K.4
  • 47
    • 67649889403 scopus 로고    scopus 로고
    • Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
    • June
    • Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An IP traceback system to find the real source of attacks," IEEETrans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, June 2009.
    • (2009) IEEETrans. Parallel Distrib. Syst. , vol.20 , Issue.4 , pp. 567-580
    • Xiang, Y.1    Zhou, W.2    Guo, M.3
  • 48
    • 79551523280 scopus 로고    scopus 로고
    • Traceback of DDoS attacks using entropy variations
    • Mar.
    • S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of DDoS attacks using entropy variations," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 3, pp. 412-425, Mar. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.3 , pp. 412-425
    • Yu, S.1    Zhou, W.2    Doss, R.3    Jia, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.