Detection Method of Distributed Denial-of-Service Flooding Attacks Using Analysis of Flow Information
暂无分享,去创建一个
[1] Shunzheng Yu,et al. Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.
[2] Supranamaya Ranjan,et al. DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[3] Wenke Lee,et al. Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[4] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[5] Sanguk Noh,et al. Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning , 2003, IDEAL.
[6] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[7] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[9] Nam-Hi Kang,et al. Efficient Buffer Management Scheme for Mitigating Possibility of DDoS Attack , 2012 .
[10] Jian Yuan,et al. Monitoring the macroscopic effect of DDoS flooding attacks , 2005, IEEE Transactions on Dependable and Secure Computing.