메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Distributed change-point detection of ddos attacks: Experimental results on DETER testbed

Author keywords

[No Author keywords available]

Indexed keywords

FLOODS; NETWORK SECURITY; TESTBEDS;

EID: 84925338777     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (29)
  • 1
    • 3042825073 scopus 로고    scopus 로고
    • IP Traceback: A New Denial-of-Service Deterrent
    • May/June
    • H. Aljifri, “IP Traceback: A New Denial-of-Service Deterrent,” IEEE Security and Privacy, May/June 2003, pp. 24-31.
    • (2003) IEEE Security and Privacy , pp. 24-31
    • Aljifri, H.1
  • 4
    • 1642535783 scopus 로고    scopus 로고
    • A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-sequential Change-Point Detection Methods
    • June
    • R. Blazek, et al, “A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-sequential Change-Point Detection Methods,” Proc. of IEEE Workshop on Information Assurance and Security, June 2001.
    • (2001) Proc. of IEEE Workshop on Information Assurance and Security
    • Blazek, R.1
  • 6
    • 21244446746 scopus 로고    scopus 로고
    • Perimeter-Based Defense against High Bandwidth DDoS Attacks
    • June
    • S. Chen and Q. Song, “Perimeter-Based Defense against High Bandwidth DDoS Attacks,” IEEE Trans. on Parallel and Distributed Systems, Vol. 16, No. 6, June 2005.
    • (2005) IEEE Trans. on Parallel and Distributed Systems , vol.16 , Issue.6
    • Chen, S.1    Song, Q.2
  • 7
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative Detection of DDoS Attacks over Multiple Network Networks
    • accepted and to appear in
    • Y. Chen, K. Hwang, and W.-S. Ku, “Collaborative Detection of DDoS Attacks over Multiple Network Networks”, IEEE Transaction on Parallel and Distributed Systems, accepted and to appear in 2007.
    • (2007) IEEE Transaction on Parallel and Distributed Systems
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 11
    • 39049161433 scopus 로고    scopus 로고
    • Identification of Repeated Denial of Service Attacks
    • Barcelona, Spain, April 23-29
    • A. Hussain, J. Heidemann, and C. Papadopoulos, “Identification of Repeated Denial of Service Attacks,” IEEE INFOCOM 2006, Barcelona, Spain, April 23-29, 2006.
    • (2006) IEEE INFOCOM 2006
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 13
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
    • Jan-March
    • K. Hwang, M. Cai, Y. Chen, and M. Qin, “Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes”, IEEE Trans. on Dependable and Secure Computing, Vol.4, No.1, Jan-March, 2007, pp.41-55.
    • (2007) IEEE Trans. on Dependable and Secure Computing , vol.4 , Issue.1 , pp. 41-55
    • Hwang, K.1    Cai, M.2    Chen, Y.3    Qin, M.4
  • 15
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: Statistics-Based Overload Control Against Distributed Denial of-Service Attacks
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, “PacketScore: Statistics-Based Overload Control Against Distributed Denial of-Service Attacks,” Proc. INFOCOM, 2004.
    • (2004) Proc. INFOCOM
    • Kim, Y.1    Lau, W. C.2    Chuah, M. C.3    Chao, H. J.4
  • 19
    • 84860047021 scopus 로고    scopus 로고
    • Cooperation in Internet Data Acquisition and Analysis
    • Cambridge, MA., Sept. 8-10, (CAIDA Project)
    • T. Monk and K. Claffy, “Cooperation in Internet Data Acquisition and Analysis,” Coordination and Administration of the Internet Workshop, Cambridge, MA., Sept. 8-10, 1996, (CAIDA Project), http://www.caida.org/.
    • (1996) Coordination and Administration of the Internet Workshop
    • Monk, T.1    Claffy, K.2
  • 24
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
    • Barcelona, April 23-29
    • S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, “DDoS-resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection,” IEEE INFOCOM 2006, Barcelona, April 23-29, 2006.
    • (2006) IEEE INFOCOM 2006
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 25
    • 14944374980 scopus 로고    scopus 로고
    • Self-Configuring Network Traffic Generation
    • Taormina, Sicily, Italy, Oct. 25-27
    • J. Sommers and P. Barford, “Self-Configuring Network Traffic Generation,” in Proc. of ACM Internet Measurement Conference, Taormina, Sicily, Italy, Oct. 25-27, 2004.
    • (2004) Proc. of ACM Internet Measurement Conference
    • Sommers, J.1    Barford, P.2
  • 28
    • 33745686749 scopus 로고    scopus 로고
    • On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks
    • July
    • X. Wang, S. Chellappan, P. Boyer, and D. Xuan, “On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks,” IEEE Trans. on Parallel and Distributed Systems, Vol. 17, July 2006.
    • (2006) IEEE Trans. on Parallel and Distributed Systems , vol.17
    • Wang, X.1    Chellappan, S.2    Boyer, P.3    Xuan, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.