메뉴 건너뛰기




Volumn , Issue , 2014, Pages 456-462

Next generation application-layer ddos defences: Applying the concepts of outlier detection in data streams with concept drift

Author keywords

application layer DDoS; data stream with concept drift; dynamic Web domain; intrusion detection amp; defence; outlier detection; simulation

Indexed keywords

ARTIFICIAL INTELLIGENCE; DATA COMMUNICATION SYSTEMS; DATA HANDLING; DENIAL-OF-SERVICE ATTACK; HTTP; INTRUSION DETECTION; LEARNING SYSTEMS; SOCIAL NETWORKING (ONLINE); STATISTICS; WEBSITES; WORLD WIDE WEB;

EID: 84946685423     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMLA.2014.80     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 1
    • 35348821984 scopus 로고    scopus 로고
    • Web page revisitation revisited: Implications of a long-term click-stream study of browser usage
    • San Jose, California, USA
    • H. Obendorf, H. Weinreich, E. Herder, and M. Mayer, "Web Page Revisitation Revisited: Implications of a Long-term Click-stream Study of Browser Usage," in In proceedings of CHI '07, San Jose, California, USA, 2007, pp. 597-606.
    • (2007) Proceedings of CHI ' 07 , pp. 597-606
    • Obendorf, H.1    Weinreich, H.2    Herder, E.3    Mayer, M.4
  • 2
    • 77954646988 scopus 로고    scopus 로고
    • A characterization of online browsing behavior
    • Raleigh, North Carolina, USA
    • R. Kumar and A. Tomkins, "A Characterization of Online Browsing Behavior," in World Wide Web, Raleigh, North Carolina, USA, 2010, pp. 561-570.
    • (2010) World Wide Web , pp. 561-570
    • Kumar, R.1    Tomkins, A.2
  • 3
    • 84967196672 scopus 로고    scopus 로고
    • Aug.
    • J. Lewis. (2012, Aug.) Forbes.com. [Online]. http://www.forbes.com/sites/ciocentral/2012/05/08/figuring-ddos-attackrisks-into-it-security-budgets/
    • (2012) Forbes.com
    • Lewis, J.1
  • 4
    • 84924739181 scopus 로고    scopus 로고
    • Arbor Networks Whitepaper 2012. [Online]. Arbor Networks, "The Growing Threat of Application-Layer DDoS Attacks", Whitepaper
    • "The Growing Threat of Application-Layer DDoS Attacks," Arbor Networks Whitepaper, 2012. [Online]. Arbor Networks, "The Growing Threat of Application-Layer DDoS Attacks", Whitepaper, 2012.
    • (2012) The Growing Threat of Application-Layer DDoS Attacks
  • 5
    • 84924949069 scopus 로고    scopus 로고
    • (2010 Nov.) OWASP
    • W. O. Chee. (2010, Nov.) OWASP. [Online]. https://www.owasp.org/images/4/43/Layer-7-DDOS.pdf
    • Chee, W.O.1
  • 6
    • 84924949068 scopus 로고    scopus 로고
    • (2012, May) User-agent-string.info
    • (2012, May) User-agent-string.info. [Online]. http://user-agentstring. info/
  • 7
    • 84869385976 scopus 로고    scopus 로고
    • Detection of malicious and nonmalicious website visitors using unsupervised neural network learning
    • Jan
    • D. Stevanovic, N. Vlajic, and A. An, "Detection of Malicious and Nonmalicious Website Visitors Using Unsupervised Neural Network Learning," Applied Soft Computing, vol. 13, no. 1, pp. 698-708, Jan. 2013.
    • (2013) Applied Soft Computing , vol.13 , Issue.1 , pp. 698-708
    • Stevanovic, D.1    Vlajic, N.2    An, A.3
  • 10
    • 84924949067 scopus 로고    scopus 로고
    • Evading DDoS detection with mimicry attacks
    • Enschede, Netherlands
    • M. Rijke, "Evading DDoS detection with mimicry attacks," in 17th Twente Student Conference on IT, Enschede, Netherlands, 2012.
    • (2012) 17th Twente Student Conference on IT
    • Rijke, M.1
  • 16
    • 36849092449 scopus 로고    scopus 로고
    • Density-based clustering for real-ime stream data
    • New York, NY
    • Y. Chen and L. Tu, "Density-based clustering for real-ime stream data," in KDD'07, New York, NY, 2007, pp. 133-142.
    • (2007) KDD'07 , pp. 133-142
    • Chen, Y.1    Tu, L.2
  • 17
    • 84893276616 scopus 로고    scopus 로고
    • On density-based data streams clustering algorithms: A survey
    • Jan
    • A. Amini, T. Y. Wah, and H. Saboohi, "On Density-Based Data Streams Clustering Algorithms: A Survey," Computer Science and Technology, vol. 29, no. 1, pp. 116-141, Jan. 2014.
    • (2014) Computer Science and Technology , vol.29 , Issue.1 , pp. 116-141
    • Amini, A.1    Wah, T.Y.2    Saboohi, H.3
  • 20
    • 67049085174 scopus 로고    scopus 로고
    • Anomaly detection in large sets of high-dimensional symbol sequences
    • Technical Report . NASA TM-
    • S. Budalakoti, A. Srivastava, R. Akella, and E. Turkov, "Anomaly detection in large sets of high-dimensional symbol sequences," NASA Ames Research Center, Technical Report . NASA TM-2006-2145, 2006.
    • (2006) NASA Ames Research Center , pp. 2006-2145
    • Budalakoti, S.1    Srivastava, A.2    Akella, R.3    Turkov, E.4
  • 23
    • 84867147707 scopus 로고    scopus 로고
    • Smart crawlers for flash-crowd ddos: The attacker's perspective
    • Guelph, Canada
    • D. Drinfeld and N. Vlajic, "Smart Crawlers for Flash-Crowd DDoS: The Attacker's Perspective," in IEEE World Congress on Internet Security, Guelph, Canada, 2012, pp. 37-44.
    • (2012) IEEE World Congress on Internet Security , pp. 37-44
    • Drinfeld, D.1    Vlajic, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.