LADS: Large-scale Automated DDoS Detection System
暂无分享,去创建一个
Vyas Sekar | Nick G. Duffield | Jacobus E. van der Merwe | Hui Zhang | Oliver Spatscheck | V. Sekar | N. Duffield | Hui Zhang | O. Spatscheck | J. Merwe | Vyas Sekar | Oliver Spatscheck
[1] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[2] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[3] Carsten Lund,et al. Learn more, sample less: control of volume and variance in network measurement , 2005, IEEE Transactions on Information Theory.
[4] Balachander Krishnamurthy,et al. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.
[5] John S. Sobolewski,et al. SideCar: building programmable datacenter networks without programmable switches , 2010, Hotnets-IX.
[6] Vyas Sekar,et al. Sparse approximations for high fidelity compression of network traffic data , 2005, IMC '05.
[7] Balachander Krishnamurthy,et al. ATMEN: a triggered network measurement infrastructure , 2005, WWW '05.
[8] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[9] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.
[11] Albert G. Greenberg,et al. Experience in measuring backbone traffic variability: models, metrics, measurements and meaning , 2002, IMW '02.
[12] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[13] Vyas Sekar,et al. Analyzing large DDoS attacks using multiple data sources , 2006, LSAD '06.
[14] Carsten Lund,et al. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications , 2004, IMC '04.
[15] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[16] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[17] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[18] Matthew Roughan,et al. Experience in measuring internet backbone traffic variability: Models metrics, measurements and meaning , 2003 .
[19] George Varghese,et al. Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.
[20] Ion Stoica,et al. Taming IP packet flooding attacks , 2004, Comput. Commun. Rev..
[21] Benoit Claise,et al. Cisco Systems NetFlow Services Export Version 9 , 2004, RFC.
[22] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[23] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[24] Jeffrey D. Case,et al. Simple Network Management Protocol (SNMP) , 1989, RFC.
[25] Rangarajan Vasudevan,et al. Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies , 2006, USENIX Annual Technical Conference, General Track.
[26] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[27] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[28] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[29] Jake D. Brutlag,et al. Aberrant Behavior Detection in Time Series for Network Monitoring , 2000, LISA.
[30] Zhi-Li Zhang,et al. Profiling internet backbone traffic: behavior models and applications , 2005, SIGCOMM '05.
[31] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[32] J. Hellerstein,et al. A Wakeup Call for Internet Monitoring Systems : The Case for Distributed Triggers , 2004 .
[33] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[34] Albert G. Greenberg,et al. Network anomography , 2005, IMC '05.
[35] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[36] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[37] George Varghese,et al. On Scalable Attack Detection in the Network , 2004, IEEE/ACM Transactions on Networking.
[38] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.