Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
暂无分享,去创建一个
[1] Patrice Abry,et al. Wavelet Analysis of Long-Range-Dependent Traffic , 1998, IEEE Trans. Inf. Theory.
[2] Yuting Zhang,et al. Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Alefiya Hussain,et al. Spectral Characteristics of Saturated Links , 2004 .
[4] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[5] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[6] Mun Choon Chan,et al. On the effectiveness of DDoS attacks on statistical filtering , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[7] Kai Hwang,et al. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis , 2006, J. Parallel Distributed Comput..
[8] Anja Feldmann,et al. A non-instrusive, wavelet-based approach to detecting network performance problems , 2001, IMW '01.
[9] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[10] Jennifer C. Hou,et al. An In-Depth, Analytical Study of Sampling Techniques for Self-Similar Internet Traffic , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[11] H. T. Kung,et al. Use of spectral analysis in defense against DoS attacks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[12] Xiapu Luo,et al. On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.
[13] Kai Hwang,et al. Filtering of shrew DDoS attacks in frequency domain , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[14] David K. Y. Yau,et al. Defending against low-rate TCP attacks: dynamic detection and protection , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[15] Edward J. Powers,et al. A wavelet-based approach to detect shared congestion , 2004, SIGCOMM 2004.
[16] Venugopal V. Veeravalli,et al. A sequential procedure for multihypothesis testing , 1994, IEEE Trans. Inf. Theory.
[17] C. Priebe,et al. On the Spectral Analysis of Backscatter Data , 2004 .
[18] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[19] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[20] Catherine Rosenberg,et al. Cyber defense technology networking and evaluation , 2004, CACM.
[21] Ness B. Shroff,et al. Emulation versus simulation: a case study of TCP-targeted denial of service attacks , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..
[22] John W. Lockwood,et al. A framework for rule processing in reconfigurable network systems , 2005, 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM'05).
[23] T.Y. Lin,et al. Anomaly detection , 1994, Proceedings New Security Paradigms Workshop.