A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks

[1]  Li Xu,et al.  Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[2]  Yong Guan,et al.  A fast sketch for aggregate queries over high-speed network traffic , 2012, 2012 Proceedings IEEE INFOCOM.

[3]  Michel Toulouse,et al.  A Consensus Based Network Intrusion Detection System , 2015, 2015 5th International Conference on IT Convergence and Security (ICITCS).

[4]  Jin Wang,et al.  Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[5]  Sonia Fahmy,et al.  Pegasus: Precision hunting for icebergs and anomalies in network flows , 2013, 2013 Proceedings IEEE INFOCOM.

[6]  Wanlei Zhou,et al.  Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.

[7]  Victor C. Valgenti,et al.  TrustGuard: A flow-level reputation-based DDoS defense system , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[8]  Michael Kaplan,et al.  Detecting communication anomalies in tactical networks via graph learning , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[9]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[10]  Yonghong Chen,et al.  DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory , 2013, IEEE Communications Letters.

[11]  Minyi Guo,et al.  A dynamical Deterministic Packet Marking scheme for DDoS traceback , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[12]  Ye Wang,et al.  NetFuse: Short-circuiting traffic surges in the cloud , 2013, 2013 IEEE International Conference on Communications (ICC).

[13]  Aiko Pras,et al.  The effects of DDoS attacks on flow monitoring applications , 2012, 2012 IEEE Network Operations and Management Symposium.

[14]  George Varghese,et al.  On scalable attack detection in the network , 2007, TNET.

[15]  Budi Rahardjo,et al.  Traffic anomaly detection in DDos flooding attack , 2014, 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA).

[16]  Shun-Zheng Yu,et al.  Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.

[17]  Ari Takanen,et al.  Preventing DoS attacks in NGN networks with proactive specification-based fuzzing , 2012, IEEE Communications Magazine.

[18]  Akihiro Nakao,et al.  MI: Cross-Layer Malleable Identity , 2011, 2011 IEEE International Conference on Communications (ICC).

[19]  V. K. Soundar Rajam,et al.  Autonomous system based traceback mechanism for DDoS attack , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).

[20]  Wei Wei,et al.  A Rank Correlation Based Detection against Distributed Reflection DoS Attacks , 2013, IEEE Communications Letters.

[21]  Wee Keong Ng,et al.  Cornstarch effect: intensifying flow resistance for increasing DDoS attacks in autonomous overlays , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).