메뉴 건너뛰기




Volumn 62, Issue , 2015, Pages 59-71

Inferring distributed reflection denial of service attacks from darknet

Author keywords

Cyber threats; Darknet; DDoS; DNS; DRDoS

Indexed keywords

INTERNET PROTOCOLS; K-MEANS CLUSTERING; MAXIMUM PRINCIPLE; NETWORK LAYERS; NETWORK SECURITY;

EID: 84928823469     PISSN: 01403664     EISSN: 1873703X     Source Type: Journal    
DOI: 10.1016/j.comcom.2015.01.016     Document Type: Article
Times cited : (47)

References (57)
  • 9
    • 14944341848 scopus 로고    scopus 로고
    • On the design and use of internet sinks for network abuse monitoring
    • Yegneswaran, Vinod et al., On the design and use of internet sinks for network abuse monitoring, in: Recent Advances in Intrusion Detection, 2004.
    • (2004) Recent Advances in Intrusion Detection
    • Yegneswaran1    Vinod2
  • 13
    • 84055171428 scopus 로고    scopus 로고
    • Corrupted dns resolution paths: the rise of a malicious resolution authority
    • D. Dagon, N. Provos, C.P. Lee, W. Lee, Corrupted dns resolution paths: the rise of a malicious resolution authority, in: NDSS, 2008.
    • (2008) NDSS
    • Dagon, D.1    Provos, N.2    Lee, C.P.3    Lee, W.4
  • 15
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • S. Staniford, J.A. Hoagland, and J.M. McAlerney Practical automated detection of stealthy portscans J. Comput. Secur. 10 1 2002 105 136
    • (2002) J. Comput. Secur. , vol.10 , Issue.1 , pp. 105-136
    • Staniford, S.1    Hoagland, J.A.2    Mcalerney, J.M.3
  • 17
    • 0030287048 scopus 로고    scopus 로고
    • The expectation-maximization algorithm
    • T.K. Moon The expectation-maximization algorithm Signal Process. Mag. IEEE 13 6 1996 47 60
    • (1996) Signal Process. Mag. IEEE , vol.13 , Issue.6 , pp. 47-60
    • Moon, T.K.1
  • 19
  • 20
  • 30
    • 0001942153 scopus 로고    scopus 로고
    • Model selection for probabilistic clustering using cross-validated likelihood
    • P. Smyth Model selection for probabilistic clustering using cross-validated likelihood Stat. Comput. 10 1 2000 63 72
    • (2000) Stat. Comput. , vol.10 , Issue.1 , pp. 63-72
    • Smyth, P.1
  • 32
    • 84928825712 scopus 로고    scopus 로고
    • DShield, (accessed 15.11.13)
    • DShield, Dshield Port Report. < http://www1.dshield.org > (accessed 15.11.13).
    • Dshield Port Report
  • 36
    • 84928824436 scopus 로고    scopus 로고
    • accessed 15.11.13
    • Open Resolver Project. < http://openresolverproject.org/ > (accessed 15.11.13).
  • 37
    • 84928823214 scopus 로고    scopus 로고
    • accessed 15.11.13
    • Sourcefire, Snort NIDS. < http://www.snort.org/ > (accessed 15.11.13).
    • Snort NIDS
    • Sourcefire1
  • 46
    • 84872155077 scopus 로고    scopus 로고
    • Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
    • P.A.R. Kumar, and S. Selvakumar Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Comput. Commun. 36 3 2013 303 319
    • (2013) Comput. Commun. , vol.36 , Issue.3 , pp. 303-319
    • Kumar, P.A.R.1    Selvakumar, S.2
  • 49
    • 77955771346 scopus 로고    scopus 로고
    • Dtrab: combating against attacks on encrypted protocols through traffic-feature analysis
    • Z.M. Fadlullah, T. Taleb, A.V. Vasilakos, M. Guizani, and N. Kato Dtrab: combating against attacks on encrypted protocols through traffic-feature analysis IEEE/ACM Trans. Network. (TON) 18 4 2010 1234 1247
    • (2010) IEEE/ACM Trans. Network. (TON) , vol.18 , Issue.4 , pp. 1234-1247
    • Fadlullah, Z.M.1    Taleb, T.2    Vasilakos, A.V.3    Guizani, M.4    Kato, N.5
  • 51
    • 78149346483 scopus 로고    scopus 로고
    • Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
    • ACM
    • G. Yao, J. Bi, and Z. Zhou Passive IP traceback: capturing the origin of anonymous traffic through network telescopes ACM SIGCOMM Computer Communication Review vol. 40 2010 ACM 413 414
    • (2010) ACM SIGCOMM Computer Communication Review , vol.40 , pp. 413-414
    • Yao, G.1    Bi, J.2    Zhou, Z.3
  • 52
    • 77954294167 scopus 로고    scopus 로고
    • Study on classification and characteristics of source address spoofing attacks in the internet
    • IEEE
    • J. Bi, P. Hu, and P. Li Study on classification and characteristics of source address spoofing attacks in the internet Ninth International Conference on Networks (ICN), 2010 2010 IEEE 226 230
    • (2010) Ninth International Conference on Networks (ICN), 2010 , pp. 226-230
    • Bi, J.1    Hu, P.2    Li, P.3
  • 53
    • 84893638103 scopus 로고    scopus 로고
    • Demo abstract: towards extracting semantics by visualizing large traceroute datasets
    • E. Gansner, B. Krishnamurthy, W. Willinger, F. Bustamante, and M. Snchez Demo abstract: towards extracting semantics by visualizing large traceroute datasets Computing 96 1 2014 81 83 10.1007/s00607-013-0290-8
    • (2014) Computing , vol.96 , Issue.1 , pp. 81-83
    • Gansner, E.1    Krishnamurthy, B.2    Willinger, W.3    Bustamante, F.4    Snchez, M.5
  • 56
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • V. Paxson An analysis of using reflectors for distributed denial-of-service attacks SIGCOMM Comput. Commun. Rev. 31 3 2001 38 47 10.1145/505659.505664
    • (2001) SIGCOMM Comput. Commun. Rev. , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.