Qualified Vector Match and Merge Algorithm (QVMMA) for DDoS Prevention and Mitigation
暂无分享,去创建一个
[1] R. K. Pateriya,et al. Mitigating DDoS using Threshold-based Filtering in Collaboration with Capability Mechanisms , 2014 .
[2] Raouf Boutaba,et al. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks , 2012, IEEE/ACM Transactions on Networking.
[3] Wanlei Zhou,et al. Information theory based detection against network behavior mimicking DDoS attacks , 2008, IEEE Communications Letters.
[4] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Vamsi Paruchuri,et al. TTL Based Packet Marking for IP Traceback , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[6] Daniel S. Yeung,et al. A covariance analysis model for DDoS attack detection , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[7] Xenofontas A. Dimitropoulos,et al. Histogram-based traffic anomaly detection , 2009, IEEE Transactions on Network and Service Management.
[8] Jose Anand,et al. Performance Analysis of ACO-based IP Traceback , 2012 .
[9] Naixue Xiong,et al. An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory , 2011, The Journal of Supercomputing.
[10] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[11] Kai Hwang,et al. Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.
[12] M. Uysal,et al. DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks , 2009, IEEE/ACM Transactions on Networking.
[13] Manish Parashar,et al. Cooperative Defence Against DDoS Attacks , 2006, J. Res. Pract. Inf. Technol..
[14] Qijun Gu,et al. Denial of Service Attacks , 2012 .
[15] Belhassen Zouari,et al. A Distributed and Coordinated Massive DDOS Attack Detection and Response Approach , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops.
[16] Wanlei Zhou,et al. Chaos theory based detection against network mimicking DDoS attacks , 2009, IEEE Communications Letters.
[17] Jean-Yves Le Boudec,et al. A Two-Layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models , 2008, PAM.
[18] Sonia Fahmy,et al. Pegasus: Precision hunting for icebergs and anomalies in network flows , 2013, 2013 Proceedings IEEE INFOCOM.
[19] Abhinav Bhandari,et al. Detection Techniques against DDoS Attacks: A Comprehensive Review , 2014 .
[20] Jung-Min Park,et al. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[21] Ali A. Ghorbani,et al. A Novel Covariance Matrix Based Approach for Detecting Network Anomalies , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[22] Yinan Jing,et al. A Coding-Based Incremental Traceback Scheme against DDoS Attacks in MANET , 2013 .
[23] Ahmed Karmouch,et al. Network anomaly diagnosis via statistical analysis and evidential reasoning , 2008, IEEE Transactions on Network and Service Management.
[24] Wanlei Zhou,et al. Mark-aided distributed filtering by using neural network for DDoS defense , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..