Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense
暂无分享,去创建一个
[1] Wanlei Zhou,et al. Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics , 2009, 2009 Third International Conference on Network and System Security.
[2] Muhammad Aamir,et al. Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET , 2012, ArXiv.
[3] Brij B. Gupta,et al. Predicting Number of Zombies in a DDoS Attack Using ANN Based Scheme , 2011 .
[4] John Langford,et al. Telling humans and computers apart automatically , 2004, CACM.
[5] Jian Yuan,et al. Monitoring the macroscopic effect of DDoS flooding attacks , 2005, IEEE Transactions on Dependable and Secure Computing.
[6] Urbashi Mitra,et al. Parametric Methods for Anomaly Detection in Aggregate Traffic , 2011, IEEE/ACM Transactions on Networking.
[7] Gurjinder Kaur,et al. Distributed Denial of Service Attacks in Mobile Adhoc Networks , 2011 .
[8] Vijay Varadharajan,et al. Counteracting DDoS attacks in WLAN , 2011, SIN '11.
[9] Wanlei Zhou,et al. Distributed Denial of Service (DDoS) detection by traffic pattern analysis , 2014, Peer-to-Peer Netw. Appl..
[10] Jun Bi,et al. An adaptive probabilistic marking scheme for fast and secure traceback , 2013 .
[11] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[12] Sanjeev Khanna,et al. Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks , 2012, IEEE/ACM Transactions on Networking.
[13] Shunzheng Yu,et al. Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.
[14] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[15] Jin Li,et al. DDoS attack detection based on neural network , 2010, 2010 2nd International Symposium on Aware Computing.
[16] Zhang Chao-yang. DOS Attack Analysis and Study of New Measures to Prevent , 2011, 2011 International Conference on Intelligence Science and Information Engineering.
[17] Aikaterini Mitrokotsa,et al. Denial‐of‐Service Attacks , 2007 .
[18] Amir Herzberg,et al. LOT: A Defense Against IP Spoofing and Flooding Attacks , 2012, TSEC.
[19] Di Wu,et al. A Survey on Latest Botnet Attack and Defense , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[20] Geert Deconinck,et al. Denial of Service Attacks: a Tutorial , 2011 .
[21] Brij B. Gupta,et al. Estimating Strength of a DDoS Attack in Real Time Using ANN Based Scheme , 2011 .