A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks
暂无分享,去创建一个
[1] Li Xu,et al. Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[2] Yong Guan,et al. A fast sketch for aggregate queries over high-speed network traffic , 2012, 2012 Proceedings IEEE INFOCOM.
[3] Michel Toulouse,et al. A Consensus Based Network Intrusion Detection System , 2015, 2015 5th International Conference on IT Convergence and Security (ICITCS).
[4] Jin Wang,et al. Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[5] Sonia Fahmy,et al. Pegasus: Precision hunting for icebergs and anomalies in network flows , 2013, 2013 Proceedings IEEE INFOCOM.
[6] Wanlei Zhou,et al. Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.
[7] Victor C. Valgenti,et al. TrustGuard: A flow-level reputation-based DDoS defense system , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[8] Michael Kaplan,et al. Detecting communication anomalies in tactical networks via graph learning , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[9] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[10] Yonghong Chen,et al. DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory , 2013, IEEE Communications Letters.
[11] Minyi Guo,et al. A dynamical Deterministic Packet Marking scheme for DDoS traceback , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[12] Ye Wang,et al. NetFuse: Short-circuiting traffic surges in the cloud , 2013, 2013 IEEE International Conference on Communications (ICC).
[13] Aiko Pras,et al. The effects of DDoS attacks on flow monitoring applications , 2012, 2012 IEEE Network Operations and Management Symposium.
[14] George Varghese,et al. On scalable attack detection in the network , 2007, TNET.
[15] Budi Rahardjo,et al. Traffic anomaly detection in DDos flooding attack , 2014, 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA).
[16] Shun-Zheng Yu,et al. Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.
[17] Ari Takanen,et al. Preventing DoS attacks in NGN networks with proactive specification-based fuzzing , 2012, IEEE Communications Magazine.
[18] Akihiro Nakao,et al. MI: Cross-Layer Malleable Identity , 2011, 2011 IEEE International Conference on Communications (ICC).
[19] V. K. Soundar Rajam,et al. Autonomous system based traceback mechanism for DDoS attack , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).
[20] Wei Wei,et al. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks , 2013, IEEE Communications Letters.
[21] Wee Keong Ng,et al. Cornstarch effect: intensifying flow resistance for increasing DDoS attacks in autonomous overlays , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).