Emergence of DDoS resistant augmented Split architecture
暂无分享,去创建一个
[1] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[2] Fengmin Gong,et al. Deciphering Detection Techniques: Part III Denial of Service Detection , 2003 .
[3] B. B. Gupta,et al. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network , 2012, ArXiv.
[4] Vinod Yegneswaran,et al. Characteristics of internet background radiation , 2004, IMC '04.
[5] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[6] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[7] Alexander L. Wijesinha,et al. Split protocol client/server architecture , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).
[8] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[9] Basil S. Maglaris,et al. Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks , 2004, Journal of Network and Systems Management.
[10] Juhi Jain,et al. Mitigation of Denial of Service (DoS) Attack , 2011 .
[11] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[12] Bharat S. Rawal,et al. Multi-client/Multi-server split architecture , 2013, The International Conference on Information Networking 2013 (ICOIN).
[13] Alexander L. Wijesinha,et al. The Design and Performance of a Bare PC Web Server , 2008, Int. J. Comput. Their Appl..
[14] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[15] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[16] Alexander L. Wijesinha,et al. Mini Web Server Clusters for HTTP Request Splitting , 2011, 2011 IEEE International Conference on High Performance Computing and Communications.
[17] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[18] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[19] Qi Zhang,et al. Indra: A Distributed Approach to Network Intrusion Detection and Prevention , 2001 .
[20] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[21] Roch Guérin,et al. On the robustness of router-based denial-of-service (DoS) defense systems , 2005, CCRV.
[22] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[23] Wanlei Zhou,et al. Chaos theory based detection against network mimicking DDoS attacks , 2009, IEEE Communications Letters.
[24] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[25] Brett Wilson,et al. Autonomic Response to Distributed Denial of Service Attacks , 2001, Recent Advances in Intrusion Detection.
[26] Alexander L. Wijesinha,et al. A split protocol technique for web server migration , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[27] S. Malathi,et al. AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DD OS , 2011 .
[28] Kai Hwang,et al. Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.
[29] Ruby B. Lee,et al. Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures , 2003 .
[30] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[31] S. Malathi,et al. Prevention of Attacks under DDoS Using Target Customer Behavior , 2012 .
[32] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[33] Robert Beverly,et al. The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet , 2005, SRUTI.
[34] Randall R. Stewart,et al. Improving TCP's Robustness to Blind In-Window Attacks , 2010, RFC.
[35] Rocky K. C. Chang,et al. Engineering of a global defense infrastructure for DDoS attacks , 2002, Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588).
[36] Abdullah Gani,et al. Bayesian Learning Networks Approach to Cybercrime Detection , 2003 .
[37] Alexander L. Wijesinha,et al. Splitting HTTP requests on two servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[38] DiotChristophe,et al. Mining anomalies using traffic feature distributions , 2005 .
[39] David Slee. Common Denial of Service Attacks , 2007 .
[40] Andreas Blass,et al. Inadequacy of computable loop invariants , 2001, TOCL.
[41] Robert Beverly,et al. The spoofer project: inferring the extent of source address filtering on the internet , 2005 .