메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 421-427

DDoS attack detection and wavelets

Author keywords

Computational complexity; Computer crime; Energy capture; Filtering; IP networks; Power generation economics; Telecommunication traffic; Traffic control; Wavelet analysis; Web and internet services

Indexed keywords

COMPLEX NETWORKS; COMPUTATIONAL COMPLEXITY; DENIAL-OF-SERVICE ATTACK; ELECTRIC POWER DISTRIBUTION; FILTRATION; INTERNET; INTERNET PROTOCOLS; TELECOMMUNICATION SERVICES; TELECOMMUNICATION TRAFFIC; TRAFFIC CONTROL; WAVELET ANALYSIS;

EID: 84952326439     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2003.1284203     Document Type: Conference Paper
Times cited : (48)

References (26)
  • 1
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attack: A tutorial
    • Oct.
    • Rocky K. C. Chang, "Defending against flooding-based distributed denial-of-service attack: a tutorial," IEEE Comm. Magazine, Vol.40 No.10, Oct. 2002, pp. 42-51.
    • (2002) IEEE Comm. Magazine , vol.40 , Issue.10 , pp. 42-51
    • Rocky, K.C.1    Chang2
  • 2
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in World Wide Web traffic: Evidence and possible causes
    • Dec.
    • M.E. Crovella and A. Bestavros, "Self-similarity in World Wide Web traffic: evidence and possible causes," IEEE/ACM Trans. on Networking, Vol.5 No.6, Dec. 1997, pp.835-846.
    • (1997) IEEE/ACM Trans. on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 4
    • 0041488497 scopus 로고    scopus 로고
    • Apr. 8
    • CERT, "Overview of attack trends," http://www.cert.org/archive/pdf/attack-trends.pdf, Apr. 8, 2002.
    • (2002) Overview of Attack Trends
  • 5
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of poisson modeling
    • June
    • V. Paxson and S. Floyd, "Wide Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Trans. on Networking, Vol. 3 No. 3, June 1995, pp.226-244.
    • (1995) IEEE/ACM Trans. on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 7
    • 17444409457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP address spoofing
    • Jan.
    • P. Ferguson and D. Senie, "Network ingress filtering: defeating denial of service attacks which employ IP address spoofing," Internet Draft, Jan. 1998.
    • (1998) Internet Draft
    • Ferguson, P.1    Senie, D.2
  • 8
    • 85013591309 scopus 로고
    • On the self-similar nature of ethernet traffic
    • Aug.
    • W. Leland, M. Taqqu, W. Willinger and D. Wilson, "On the self-similar nature of Ethernet traffic," In Proc. ACM SIGCOMM, Vol.23 No.4, Aug. 1993, pp.183-193.
    • (1993) Proc. ACM SIGCOMM , vol.23 , Issue.4 , pp. 183-193
    • Leland, W.1    Taqqu, M.2    Willinger, W.3    Wilson, D.4
  • 9
    • 0028377540 scopus 로고
    • On the self-similar nature of Ethernet traffic (Extended Version)
    • Feb.
    • W. Leland, M. Taqqu, W. Willinger, and D. Wilson, "On the self-similar nature of Ethernet traffic (Extended Version)," IEEE/ACM Trans. on Networking, Vol. 2 No.1, Feb. 1994, pp.1-15.
    • (1994) IEEE/ACM Trans. on Networking , vol.2 , Issue.1 , pp. 1-15
    • Leland, W.1    Taqqu, M.2    Willinger, W.3    Wilson, D.4
  • 10
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • Apr.
    • K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," in Proc. of IEEE INFOCOM'01, Apr. 2001, pp. 338-347.
    • (2001) Proc. of IEEE INFOCOM'01 , pp. 338-347
    • Park, K.1    Lee, H.2
  • 12
    • 0031700563 scopus 로고    scopus 로고
    • Wavelet analysis of long range dependent traffic
    • Jan.
    • P. Abry and D.Veitch, "Wavelet analysis of long range dependent traffic," IEEE Trans. on Infor. Theory, Vol. 44, No. 1, Jan. 1998, pp.2-15.
    • (1998) IEEE Trans. on Infor. Theory , vol.44 , Issue.1 , pp. 2-15
    • Abry, P.1    Veitch, D.2
  • 17
    • 0001173444 scopus 로고    scopus 로고
    • Long-range dependence: Revisiting aggregation with wavelets
    • May
    • P. Abry, D. Veitch, and P. Flandrin, "Long-range dependence: revisiting aggregation with wavelets," Journal of Time Series Analysis, Vol. 19, May 1998. pp. 253-266.
    • (1998) Journal of Time Series Analysis , vol.19 , pp. 253-266
    • Abry, P.1    Veitch, D.2    Flandrin, P.3
  • 18
    • 0036349135 scopus 로고    scopus 로고
    • A unified framework for understanding network traffic using independent wavelet models
    • June
    • X. Tian, J. Wu, C. Ji, "A unified framework for understanding network traffic using independent wavelet models," In Proc. IEEE INFOCOM, June 2002.
    • (2002) Proc. IEEE INFOCOM
    • Tian, X.1    Wu, J.2    Ji, C.3
  • 19
    • 0035481772 scopus 로고    scopus 로고
    • Modeling heterogeneous network traffic in wavelet domain
    • October
    • S. Ma and C. Ji, "Modeling heterogeneous network traffic in wavelet domain," IEEE/ACM Trans. Networking, Vol.9, No. 5, October 2001, pp. 634-649.
    • (2001) IEEE/ACM Trans. Networking , vol.9 , Issue.5 , pp. 634-649
    • Ma, S.1    Ji, C.2
  • 20
    • 0032090155 scopus 로고    scopus 로고
    • Generating representative Web workloads for network and server performance evaluation
    • P. Barford and M.E. Crovella, "Generating representative Web workloads for network and server performance evaluation," in ACM SigMetrics, 1998, pp.151-160.
    • (1998) ACM SigMetrics , pp. 151-160
    • Barford, P.1    Crovella, M.E.2
  • 21
    • 23044527800 scopus 로고    scopus 로고
    • Contradictory relationship between Hurst parameter and queuing performance (extended version)
    • Feb.
    • R. Ritke, X. Hong, and M. Gerla, "Contradictory relationship between Hurst parameter and queuing performance (extended version)," Telecommunication Systems, Vol 16, Feb. 2001, pp.159-175.
    • (2001) Telecommunication Systems , vol.16 , pp. 159-175
    • Ritke, R.1    Hong, X.2    Gerla, M.3
  • 22
    • 0141776045 scopus 로고    scopus 로고
    • A Markov chain model of temporal behavior for anomaly detection
    • June
    • N. Ye, "A Markov chain model of temporal behavior for anomaly detection," in Workshop on Information Assurance and Security, June 2000.
    • (2000) Workshop on Information Assurance and Security
    • Ye, N.1
  • 24
    • 0034239268 scopus 로고    scopus 로고
    • Real-time estimation of the parameters of long-range dependence
    • Aug.
    • M. Roghan, D. Veitch, and P. Abry. "Real-time estimation of the parameters of long-range dependence," IEEE/ACM Trans. on Networking, Vol.8, Aug. 2000, pp 467-478.
    • (2000) IEEE/ACM Trans. on Networking , vol.8 , pp. 467-478
    • Roghan, M.1    Veitch, D.2    Abry, P.3
  • 26
    • 0042474246 scopus 로고    scopus 로고
    • Small-time scaling behaviors of Internet backbone traffic: An empirical study
    • April
    • Z. Zhang, V. J. Ribeiro, S. Moon, and C. Diot, "Small-time scaling behaviors of Internet backbone traffic: an empirical study," In Proc. IEEE INFOCOM, April 2003.
    • (2003) Proc. IEEE INFOCOM
    • Zhang, Z.1    Ribeiro, V.J.2    Moon, S.3    Diot, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.