-
2
-
-
84961854168
-
-
http: //archive. openflow.org/documents/openflow-wp-latest. pdf
-
-
-
-
3
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
ACM Press
-
Jin C, Wang HN, Shin KG, "Hop-count filtering: An effective defense against spoofed DDoS traffic", Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), ACM Press, pp 30-41, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.N.2
Shin, K.G.3
-
4
-
-
84921652362
-
Handling intrusion and ddos attacks in software defined networks using machine learning techniques
-
Rawalpindi, Nov
-
Javed Ashraf, Seemab Latif, "Handling Intrusion and DDoS Attacks in Software Defined Networks Using Machine Learning Techniques", Software Engineering Conference (NSEC), pp. 55-60, Rawalpindi, Nov 2014.
-
(2014)
Software Engineering Conference (NSEC)
, pp. 55-60
-
-
Ashraf, J.1
Latif, S.2
-
5
-
-
70350134739
-
The use of computational intelligence in intrusion Prevention systems: A review
-
S. X. Wu and W. Banzhaf. The use of computational intelligence in intrusion Prevention systems: A review. Applied Soft Computing, 10: 1-35, 2010.
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
6
-
-
84874993569
-
Baseline profile stability for network anomaly detection
-
Jan
-
Y. Kim, J. Y. Jo, and K. K. Suh, "Baseline profile stability for network anomaly detection", International Journal of Network Security, vol. 6, No. 1, pp. 60-66, Jan 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.1
, pp. 60-66
-
-
Kim, Y.1
Jo, J.Y.2
Suh, K.K.3
-
8
-
-
0043166339
-
Anomaly detection in IP networks
-
Aug.
-
Thottan, M. and Ji, C. Y., "Anomaly Detection in IP networks, " IEEE Transactions on Signal Processing, vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.Y.2
-
10
-
-
84893749338
-
DDoS prevention method based on chaos analysis of network traffic entropy
-
January
-
Xinlei Ma, Yonghong Chen, "DDoS Prevention Method Based on Chaos Analysis of Network Traffic Entropy", IEEE Communication Letters, Vol. 18, No. 1, pp. 114-117, January 2014.
-
(2014)
IEEE Communication Letters
, vol.18
, Issue.1
, pp. 114-117
-
-
Ma, X.1
Chen, Y.2
-
12
-
-
39049125624
-
Controlling IP spoofing through interdomain packet filters
-
Z. Duan, X. Yuan, J. Chandrashekar, Controlling IP spoofing through interdomain packet filters, IEEE Trans. on Dependable and Secure, Computing, vol. 5, pp. 22-36, 2008.
-
(2008)
IEEE Trans. on Dependable and Secure, Computing
, vol.5
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
13
-
-
72849110028
-
Source-based filtering algorithm against DDoS attacks
-
F. Yi, S. Yu, W. Zhou, J. Hai, A. Bonti, Source-based filtering algorithm against DDoS attacks, International Journal of Database Theory and Application, vol. 1, pp. 9-20, 2008.
-
(2008)
International Journal of Database Theory and Application
, vol.1
, pp. 9-20
-
-
Yi, F.1
Yu, S.2
Zhou, W.3
Hai, J.4
Bonti, A.5
-
14
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, Inferring internet denial-of-service activity, ACM Transactions on Computer Systems, vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
17
-
-
0035360372
-
Designing fuzzy inference systems from data: An interpretability-oriented review
-
June
-
Serge Guillaume, "Designing Fuzzy Inference Systems from Data: An Interpretability-Oriented Review", IEEE Transactions on Fuzzy Systems, Vol. 9, No. 3, June 2001.
-
(2001)
IEEE Transactions on Fuzzy Systems
, vol.9
, Issue.3
-
-
Guillaume, S.1
-
20
-
-
84961856643
-
-
https: //www. juniper. net/documentation/en-US/junos13. 2/topics/conce pt/port-mirroring-qfx-series-understanding. html
-
-
-
-
21
-
-
84961796113
-
A survey on defense mechanisms countering ddos attacks in the network
-
July
-
Dileep Kumar G et al., "A Survey on Defense Mechanisms countering DDoS Attacks in the Network", International Journal of Advanced Research in Computer and Communication Engineering, ISSN: 2319-5940, Vol. 2, Issue 7, July 2013, p 2599-2606.
-
(2013)
International Journal of Advanced Research in Computer and Communication Engineering
, vol.2
, Issue.7
, pp. 2599-2606
-
-
Dileep Kumar, G.1
|