A similarity based approach for application DoS attacks detection
暂无分享,去创建一个
Maurizio Aiello | Gianluca Papaleo | Enrico Cambiaso | Silvia Scaglione | S. Scaglione | E. Cambiaso | M. Aiello | Gianluca Papaleo
[1] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[2] Anthony McGregor,et al. Flow Clustering Using Machine Learning Techniques , 2004, PAM.
[3] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[4] Maurizio Aiello,et al. Taxonomy of Slow DoS Attacks to Web Applications , 2012, SNDS.
[5] F. J. Anscombe,et al. Rejection of Outliers , 1960 .
[6] Sebastian Zander,et al. Automated traffic classification and application identification using machine learning , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[7] Kuldip Singh,et al. DDoS Incidents and their Impact: A Review , 2010, Int. Arab J. Inf. Technol..
[8] Mandeep Singh,et al. Flooding Based DDoS Attacks and Their Influence on Web Services , 2011 .
[9] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[10] Matthew Roughan,et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification , 2004, IMC '04.
[11] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[12] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[13] Qiang Chen,et al. An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems , 2001 .
[14] Qiang Chen,et al. Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[15] Anja Feldmann,et al. An analysis of Internet chat systems , 2003, IMC '03.
[16] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[17] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[18] Vern Paxson,et al. Empirically derived analytic models of wide-area TCP connections , 1994, TNET.
[19] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.