메뉴 건너뛰기




Volumn , Issue , 2017, Pages 204-209

Change-point cloud DDoS detection using packet inter-arrival time

Author keywords

Change point; Cloud DDoS; CUSUM; DDoS attacks; Inter arrival time; Traffic flow

Indexed keywords

NETWORK SECURITY;

EID: 85015266091     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CEEC.2016.7835914     Document Type: Conference Paper
Times cited : (25)

References (30)
  • 2
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: Owncloud as a case study
    • B. Martini and K.-K. R. Choo, "Cloud storage forensics: owncloud as a case study," Digital Investigation, vol. 10, no. 4, pp. 287-299, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1742287613000911
    • (2013) Digital Investigation , vol.10 , Issue.4 , pp. 287-299
    • Martini, B.1    Choo, K.-K.R.2
  • 3
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (ddos) resilience in cloud: Review and conceptual cloud {DDoS} mitigation framework
    • O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, "Distributed denial of service (ddos) resilience in cloud: Review and conceptual cloud {DDoS} mitigation framework," Journal of Network and Computer Applications, vol. 67, pp. 147-165, 2016. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1084804516000023
    • (2016) Journal of Network and Computer Applications , vol.67 , pp. 147-165
    • Osanaiye, O.1    Choo, K.-K.R.2    Dlodlo, M.3
  • 4
    • 84867888670 scopus 로고    scopus 로고
    • A novel intrusion severity analysis approach for clouds
    • including Special section: AIRCC-NetCoM 2009 and Special section: Clouds and Service-Oriented Architectures
    • J. Arshad, P. Townend, and J. Xu, "A novel intrusion severity analysis approach for clouds," Future Generation Computer Systems, vol. 29, no. 1, pp. 416-428, 2013, including Special section: AIRCC-NetCoM 2009 and Special section: Clouds and Service-Oriented Architectures. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167739X11001488
    • (2013) Future Generation Computer Systems , vol.29 , Issue.1 , pp. 416-428
    • Arshad, J.1    Townend, P.2    Xu, J.3
  • 5
    • 84900351494 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks: Methods, tools and future directions
    • p. bxt031
    • M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, "Detecting distributed denial of service attacks: methods, tools and future directions," The Computer Journal, p. bxt031, 2013.
    • (2013) The Computer Journal
    • Bhuyan, M.H.1    Kashyap, H.J.2    Bhattacharyya, D.K.3    Kalita, J.K.4
  • 7
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • K.-K. R. Choo, "The cyber threat landscape: Challenges and future research directions," Computers & Security, vol. 30, no. 8, pp. 719-731, 2011.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 9
    • 84925396031 scopus 로고    scopus 로고
    • DDoS attack protection in the era of cloud computing and software-defined networking
    • B. Wang, Y. Zheng, W. Lou, and Y. T. Hou, "{DDoS} attack protection in the era of cloud computing and software-defined networking," Computer Networks, vol. 81, pp. 308-319, 2015. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128615000742
    • (2015) Computer Networks , vol.81 , pp. 308-319
    • Wang, B.1    Zheng, Y.2    Lou, W.3    Hou, Y.T.4
  • 12
    • 84957693763 scopus 로고    scopus 로고
    • A comprehensive approach to discriminate {DDoS} attacks from flash events
    • M. Sachdeva, K. Kumar, and G. Singh, "A comprehensive approach to discriminate {DDoS} attacks from flash events," Journal of Information Security and Applications, vol. 26, pp. 8-22, 2016. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S2214212615000472
    • (2016) Journal of Information Security and Applications , vol.26 , pp. 8-22
    • Sachdeva, M.1    Kumar, K.2    Singh, G.3
  • 16
    • 33745371142 scopus 로고    scopus 로고
    • Proactively detecting distributed denial of service attacks using source IP address monitoring
    • Springer
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Proactively detecting distributed denial of service attacks using source ip address monitoring," in International Conference on Research in Networking. Springer, 2004, pp. 771-782.
    • (2004) International Conference on Research in Networking , pp. 771-782
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 18
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • T. T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 56-76, 2008.
    • (2008) IEEE Communications Surveys & Tutorials , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.T.1    Armitage, G.2
  • 22
    • 77953130221 scopus 로고    scopus 로고
    • A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance
    • V. M. De Oca, D. R. Jeske, Q. Zhang, C. Rendon, and M. Marvasti, "A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance," Journal of Systems and Software, vol. 83, no. 7, pp. 1288-1297, 2010.
    • (2010) Journal of Systems and Software , vol.83 , Issue.7 , pp. 1288-1297
    • De Oca, V.M.1    Jeske, D.R.2    Zhang, Q.3    Rendon, C.4    Marvasti, M.5
  • 24
    • 0000777150 scopus 로고
    • On the run length of a shewhart chart for correlated data
    • W. Schmid, "On the run length of a shewhart chart for correlated data," Statistical Papers, vol. 36, no. 1, pp. 111-130, 1995.
    • (1995) Statistical Papers , vol.36 , Issue.1 , pp. 111-130
    • Schmid, W.1
  • 25
    • 85004057304 scopus 로고
    • Sequential tests of statistical hypotheses
    • Springer
    • A. Wald, "Sequential tests of statistical hypotheses," in Breakthroughs in Statistics. Springer, 1992, pp. 256-298.
    • (1992) Breakthroughs in Statistics , pp. 256-298
    • Wald, A.1
  • 28
    • 85015344200 scopus 로고    scopus 로고
    • CAIDA. (2000) DDoS Attack 2007 Dataset. [Online]. Available: http://www.caida.org/data/passive/ddos-20070804-dataset.xml
    • (2000) DDoS Attack 2007 Dataset


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.