An Efficient Flash Crowd Attack Detection to Internet Threat Monitors (ITM) Using Honeypots
暂无分享,去创建一个
[1] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[2] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[3] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[4] Bo Hong,et al. Managing flash crowds on the Internet , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..
[5] Tatsuro Takahashi,et al. A Load Reduction System to Mitigate Flash Crowds on Web Server , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.
[6] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[7] Farnam Jahanian,et al. The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.
[8] Raphael C.-W. Phan,et al. Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[9] Mary K. Vernon,et al. Mapping Internet Sensors with Probe Response Attacks , 2005, USENIX Security Symposium.
[10] Kwok-Yan Lam,et al. Selection Policy of Rescue Servers Based on Workload Characterization of Flash Crowd , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[11] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[12] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[13] Yoichi Shinoda,et al. Vulnerabilities of Passive Internet Threat Monitors , 2005, USENIX Security Symposium.
[14] Riccardo Bettati,et al. Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures , 2010, IEEE Transactions on Computers.
[15] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[16] Xun Wang,et al. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] Kuldip Singh,et al. Performance Analysis of Web Service under DDoS Attacks , 2009, 2009 IEEE International Advance Computing Conference.