메뉴 건너뛰기




Volumn 2011, Issue 1, 2011, Pages

Sequence-order-independent network profiling for detecting application layer DDoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; PRINCIPAL COMPONENT ANALYSIS; WEBSITES;

EID: 84964247755     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1186/1687-1499-2011-50     Document Type: Article
Times cited : (32)

References (16)
  • 1
    • 84964271458 scopus 로고    scopus 로고
    • Calculating the size of the downadup outbreak--F-secure weblog: news from the Lab2009. []
    • Calculating the size of the downadup outbreak--F-secure weblog: news from the Lab2009. [http://F-secure.com]
  • 2
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS sttacks for popular websites
    • Xie Y, Yu S-Z: Monitoring the application-layer DDoS sttacks for popular websites. IEEE/ACM Trans Netw 2009, 17(1):15-25.
    • (2009) IEEE/ACM Trans Netw , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 3
    • 27144457682 scopus 로고    scopus 로고
    • Flash crowd mitigation via adaptive admission control based on application-level observations
    • Chen X, Heidemann J: Flash crowd mitigation via adaptive admission control based on application-level observations. ACM Trans Internet Technol 2005, 5(3):532-569. 10.1145/1084772.1084776
    • (2005) ACM Trans Internet Technol , vol.5 , Issue.3 , pp. 532-569
    • Chen, X.1    Heidemann, J.2
  • 4
    • 61449207953 scopus 로고    scopus 로고
    • DDoSshield: DDoS-resilient scheduling to counter application layer attacks
    • Ranjan S, Swaminathan R, Uysal M, Nucci A, Knightly E: DDoSshield: DDoS-resilient scheduling to counter application layer attacks. IEEE/ACM Trans Netw 2009, 17(1):26-39.
    • (2009) IEEE/ACM Trans Netw , vol.17 , Issue.1 , pp. 26-39
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Nucci, A.4    Knightly, E.5
  • 6
    • 68349137657 scopus 로고    scopus 로고
    • Is it congestion or a DDoS attack?
    • Shevtekar A, Ansari N: Is it congestion or a DDoS attack? IEEE Commun Lett 2009, 13(7):546-548.
    • (2009) IEEE Commun Lett , vol.13 , Issue.7 , pp. 546-548
    • Shevtekar, A.1    Ansari, N.2
  • 7
    • 84964261382 scopus 로고    scopus 로고
    • Kandula S, Katabi D, Jacob M, Berger AW: Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds. NSDI'05 []
    • Kandula S, Katabi D, Jacob M, Berger AW: Botz-4-Sale: surviving organized DDoS attacks that mimic flash crowds. NSDI'05 [http://www.usenix.org/events/nsdi05/tech/kandula/kandula.pdf]
  • 8
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Xie Y, Yu S-Z: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Netw 2009, 17(1):54-65.
    • (2009) IEEE/ACM Trans Netw , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.-Z.2
  • 9
    • 8344285705 scopus 로고    scopus 로고
    • Wide area redirection of dynamic content by internet data centers
    • Ranjan S, Karrer R, Knightly E: Wide area redirection of dynamic content by internet data centers. Proc IEEE INFOCOM 2004, 816-826.
    • (2004) Proc IEEE INFOCOM , pp. 816-826
    • Ranjan, S.1    Karrer, R.2    Knightly, E.3
  • 10
    • 0032786569 scopus 로고    scopus 로고
    • Improving support vector machine classifiers by modifying kernel function
    • Amari S, Wu S: Improving support vector machine classifiers by modifying kernel function. Neural Netw 1999, 12(6):783-789. 10.1016/S0893-6080(99)00032-5
    • (1999) Neural Netw , vol.12 , Issue.6 , pp. 783-789
    • Amari, S.1    Wu, S.2
  • 11
    • 33746828214 scopus 로고    scopus 로고
    • Formulating LLE using alignment technique
    • Zhao D: Formulating LLE using alignment technique. Pattern Recogn 2006, 39(11):2233-2235. 10.1016/j.patcog.2006.05.007
    • (2006) Pattern Recogn , vol.39 , Issue.11 , pp. 2233-2235
    • Zhao, D.1
  • 16
    • 37849023846 scopus 로고    scopus 로고
    • Incremental update of linear appearance models and its application to AAM: incremental AAM
    • Lee S, Sung J, Kim D: Incremental update of linear appearance models and its application to AAM: incremental AAM. Lecture Notes Comput Sci 2007, 4633: 538-547. 10.1007/978-3-540-74260-9_48
    • (2007) Lecture Notes Comput Sci , vol.4633 , pp. 538-547
    • Lee, S.1    Sung, J.2    Kim, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.