메뉴 건너뛰기




Volumn , Issue , 2014, Pages 39-43

Detection of DDoS backscatter based on traffic features of darknet TCP packets

Author keywords

DDoS attacks; machine learning; network security; Support Vector Machine; traffic classification

Indexed keywords

ARTIFICIAL INTELLIGENCE; BACKSCATTERING; DENIAL-OF-SERVICE ATTACK; LEARNING SYSTEMS; SECURITY OF DATA; SUPPORT VECTOR MACHINES; TELECOMMUNICATION TRAFFIC; TRANSMISSION CONTROL PROTOCOL;

EID: 84946688296     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AsiaJCIS.2014.23     Document Type: Conference Paper
Times cited : (20)

References (26)
  • 1
    • 66249100918 scopus 로고    scopus 로고
    • Distributed denial-of- service (ddos) threat in collaborative environment - A survey on ddos attack tools and traceback mechanisms
    • PAR. Kumar and S. Selvakumar, "Distributed Denial-of- Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms," Advance Computing Conference, IACC 2009, pp. 1275-1280, 2009.
    • (2009) Advance Computing Conference, IACC 2009 , pp. 1275-1280
    • Kumar, P.A.R.1    Selvakumar, S.2
  • 4
    • 84869385976 scopus 로고    scopus 로고
    • Detection of malicious and non-malicious website visitors using unsupervised neural network learning
    • D. Stevanovic, N. Vlajic, and A. An, "Detection of malicious and non-malicious website visitors using unsupervised neural network learning," Applied Soft Computing, pp. 698-708, 2013.
    • (2013) Applied Soft Computing , pp. 698-708
    • Stevanovic, D.1    Vlajic, N.2    An, A.3
  • 5
    • 84875232356 scopus 로고    scopus 로고
    • Unsupervised traffic classification using flow statistical properties and ip packet payload
    • J. Zhang, Y. Xiang, W. Zhou, and Y. Wang, "Unsupervised traffic classification using flow statistical properties and IP packet payload," Journal of Computer and System, pp. 573-585, 2013.
    • (2013) Journal of Computer and System , pp. 573-585
    • Zhang, J.1    Xiang, Y.2    Zhou, W.3    Wang, Y.4
  • 8
    • 76249083391 scopus 로고    scopus 로고
    • Practical correlation analysis between scan and malware profiles against zeroday attacks based ondarknet monitoring
    • K. Nakao, D. Inoue, and E. Masashi, "Practical correlation analysis between scan and malware profiles against zeroday attacks based ondarknet monitoring," IEICE Trans. on Information and Systems, vol.E92-D, no.5, pp. 787-798, 2009.
    • (2009) IEICE Trans. on Information and Systems , vol.E92-D , Issue.5 , pp. 787-798
    • Nakao, K.1    Inoue, D.2    Masashi, E.3
  • 9
    • 84871392471 scopus 로고    scopus 로고
    • Collaborative behavior visualization and its detection by observing darknet traffic
    • S. Akimoto, Y. Hori, and K. Sakurai, "Collaborative behavior visualization and its detection by observing darknet traffic," Cyberspace Safety and Security, pp. 212-226, 2012.
    • (2012) Cyberspace Safety and Security , pp. 212-226
    • Akimoto, S.1    Hori, Y.2    Sakurai, K.3
  • 10
    • 84888391622 scopus 로고    scopus 로고
    • A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks
    • IEEE
    • S. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," Communications Surveys & Tutorials, pp. 2046-2069, IEEE, 2013.
    • (2013) Communications Surveys & Tutorials , pp. 2046-2069
    • Zargar, S.1    Joshi, J.2    Tipper, D.3
  • 11
    • 84923532800 scopus 로고    scopus 로고
    • Kisowomanabu computer gairon
    • in Jananese
    • H. Yasui, T. Kimura, and H. Tsuji, "Kisowomanabu computer Gairon," Ohmsha, pp. 135-142, 2011, in Jananese.
    • (2011) Ohmsha , pp. 135-142
    • Yasui, H.1    Kimura, T.2    Tsuji, H.3
  • 20
    • 0242288807 scopus 로고    scopus 로고
    • Model selection for support vector machine classification
    • C. Gold and P. Sollich, "Model selection for support vector machine classification," Neurocomputing, pp. 221-249, 2003.
    • (2003) Neurocomputing , pp. 221-249
    • Gold, C.1    Sollich, P.2
  • 22
    • 85164392958 scopus 로고
    • A study of cross-validation and bootstrap for accuracy estimation and model selection
    • R. Kohavi, "A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection," IJCAI, 1995.
    • (1995) IJCAI
    • Kohavi, R.1
  • 25
    • 84923626225 scopus 로고    scopus 로고
    • Backscatter analysis toward clear categorization of dos attacks
    • in Jananese
    • J. Nakazato, J. Shimamura, M. Eto, D. Inoeu, and K. Nakao, "Backscatter Analysis toward Clear Categorization of DoS Attacks," SCIS, 2013, in Jananese.
    • (2013) SCIS
    • Nakazato, J.1    Shimamura, J.2    Eto, M.3    Inoeu, D.4    Nakao, K.5
  • 26
    • 79955702502 scopus 로고    scopus 로고
    • LIBSVM: A library for support vector machines
    • Software
    • C. C. Chang and C. J. Lin, "LIBSVM: a library for support vector machines," ACM Transactions on Intelligent Systems and Technology, 2:27:1-27:27, 2011. Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm
    • (2011) ACM Transactions on Intelligent Systems and Technology , vol.2 , pp. 271-2727
    • Chang, C.C.1    Lin, C.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.