Detection on application layer DDoS using random walk model
暂无分享,去创建一个
Gaogang Xie | Shui Yu | Guofeng Zhao | Chuan Xu | Shui Yu | Gaogang Xie | Guofeng Zhao | Chuan Xu
[1] Lukas Kencl,et al. SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers , 2012, 2012 IEEE International Conference on Communications (ICC).
[2] Mudhakar Srivatsa,et al. Mitigating application-level denial of service attacks on Web servers: A client-transparent approach , 2008, TWEB.
[3] Gerard Salton,et al. Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .
[4] Supranamaya Ranjan,et al. DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks , 2009, IEEE/ACM Transactions on Networking.
[5] Athanasios V. Vasilakos,et al. Browsing behavior mimicking attacks on popular web sites for large botnets , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[6] Shun-Zheng Yu,et al. A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors , 2009, TNET.
[7] Guofeng Zhao,et al. A novel model for user clicks identification based on hidden semi-Markov , 2013, J. Netw. Comput. Appl..
[8] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[9] Taieb Znati,et al. Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach , 2010, IEEE Transactions on Parallel and Distributed Systems.
[10] Song Guo,et al. Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient , 2012, IEEE Transactions on Parallel and Distributed Systems.
[11] Michael Walfish,et al. DDoS defense by offense , 2006, SIGCOMM 2006.
[12] Yueting Zhuang,et al. Review-oriented metadata enrichment: a case study , 2009, JCDL '09.
[13] Philippe Owezarski,et al. Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies , 2007, IEEE Transactions on Dependable and Secure Computing.