메뉴 건너뛰기




Volumn 3029, Issue , 2004, Pages 616-624

Computational intelligent techniques for detecting denial of service attacks

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE CONTROL SYSTEMS; COMPUTATIONAL METHODS; COMPUTER SIMULATION; DATA ACQUISITION; INFORMATION RETRIEVAL; INTERNET; MATHEMATICAL MODELS; REGRESSION ANALYSIS; USER INTERFACES; ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; CRIME; EXPERT SYSTEMS; INFORMATION SCIENCE; INTELLIGENT AGENTS; NETWORK SECURITY; SUPPORT VECTOR MACHINES; TRANSMISSION CONTROL PROTOCOL;

EID: 9444289934     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-24677-0_63     Document Type: Conference Paper
Times cited : (4)

References (21)
  • 1
    • 0038119011 scopus 로고    scopus 로고
    • Distributed denial of service characterization
    • Sandia National Laboratories
    • T. Draelos, et. AI, "Distributed Denial of Service Characterization," Technical Report, Sandia National Laboratories, 2003.
    • (2003) Technical Report
    • Draelos, T.1
  • 5
    • 1642283261 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • Department of Computer Science, UCLA
    • J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Technical Report # 020017, Department of Computer Science, UCLA, 2002.
    • (2002) Technical Report # 020017
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 6
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of router-based packet filtering for distributed DoS attack and prevention in power-law internets
    • K. Park, and H. Lee, "On the Effectiveness of Router-Based Packet Filtering for Distributed DoS attack and Prevention in Power-Law Internets," Proceedings of the SGICOMM'01, 2001, pp. 15-26.
    • (2001) Proceedings of the SGICOMM'01 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 8
    • 1542492748 scopus 로고    scopus 로고
    • Identifying significant features for network forensic analysis using artificial intelligence techniques
    • S. Mukkamala, and A. H. Sung, "Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques," In International Journal on Digital Evidence, IJDE Volume 1, Issue 4.
    • International Journal on Digital Evidence, IJDE , vol.1 , Issue.4
    • Mukkamala, S.1    Sung, A.H.2
  • 9
    • 0037860750 scopus 로고    scopus 로고
    • Detecting denial of service attacks using support vector machines
    • IEEE Computer Society Press
    • S. Mukkamala, and A. H. Sung, "Detecting Denial of Service Attacks Using Support Vector Machines," Proceedings of IEEE International Conference on Fuzzy Systems, IEEE Computer Society Press, 2003, pp. 1231-1236.
    • (2003) Proceedings of IEEE International Conference on Fuzzy Systems , pp. 1231-1236
    • Mukkamala, S.1    Sung, A.H.2
  • 12
    • 85141038051 scopus 로고    scopus 로고
    • Mining audit data to build intrusion detection models
    • honorable mention best application paper
    • W. Lee, S. J. Stolfo, and K. Mok, "Mining Audit Data to Build Intrusion Detection Models," Proceedings of the KDD-98, honorable mention best application paper, 1998.
    • (1998) Proceedings of the KDD-98
    • Lee, W.1    Stolfo, S.J.2    Mok, K.3
  • 16
    • 0002432565 scopus 로고
    • Multivariate adaptive regression splines
    • J. H. Friedman, Multivariate Adaptive Regression Splines, Annals of Statistics, Vol 19, 1991, pp. 1-141.
    • (1991) Annals of Statistics , vol.19 , pp. 1-141
    • Friedman, J.H.1
  • 19
    • 9444298063 scopus 로고    scopus 로고
    • AIMLeaming Technology, http://www.aimleaming.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.