Network Anomaly Detection Using Header Information With Greedy Algorithm
暂无分享,去创建一个
Emin Anarim | Süleyman Özdel | Çagatay Ates | Metehan Yildirim | E. Anarim | Metehan Yildirim | Süleyman Özdel | Çagatay Ates
[1] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[2] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[3] Sunny Behal,et al. Detection of DDoS attacks and flash events using novel information theory metrics , 2017, Comput. Networks.
[4] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[5] V. Sangeetha,et al. Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud , 2013, ArXiv.
[6] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[7] Rung Ching Chen,et al. Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.
[8] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.