Detection of stealthy TCP-based DoS attacks
暂无分享,去创建一个
Ananthram Swami | Srikanth V. Krishnamurthy | Trent Jaeger | Karl N. Levitt | Jeff Rowe | Patrick D. McDaniel | Azeem Aqil | Ahmed Osama Fathy Atya | A. Swami | K. Levitt | P. Mcdaniel | J. Rowe | S. Krishnamurthy | Azeem Aqil | A. Atya | T. Jaeger
[1] Cristina Conde,et al. Detecting denial of service by modelling web-server behaviour , 2013, Comput. Electr. Eng..
[2] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[3] I. Sasase,et al. Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[4] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[5] Peter Reiher,et al. D-WARD: DDoS Network Attack Recognition and Defense , 2002 .
[6] L. Schwartz,et al. Sophisticated Denial of Service attacks aimed at application layer , 2012, 2012 ELEKTRO.
[7] Wesley M. Eddy,et al. TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.
[8] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[9] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.