DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking
暂无分享,去创建一个
Yao Zheng | Yiwei Thomas Hou | Wenjing Lou | Bing Wang | W. Lou | Yao Zheng | Y. T. Hou | Bing Wang
[1] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[2] Xin Liu,et al. To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.
[3] Prateek Mittal,et al. Mirage: Towards Deployable DDoS Defense for Web Applications , 2011 .
[4] Jing Xu,et al. Intrusion Detection using Continuous Time Bayesian Networks , 2010, J. Artif. Intell. Res..
[5] Angelos D. Keromytis,et al. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS , 2011, ICISS.
[6] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[7] Fernando M. V. Ramos,et al. Towards secure and dependable software-defined networks , 2013, HotSDN '13.
[8] Nir Friedman,et al. Probabilistic Graphical Models - Principles and Techniques , 2009 .
[9] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[10] Yao Zheng,et al. DDoS attack protection in the era of cloud computing and Software-Defined Networking , 2015, Comput. Networks.
[11] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[12] David Heckerman,et al. A Tutorial on Learning with Bayesian Networks , 1999, Innovations in Bayesian Networks.
[13] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[14] Neil D. Lawrence,et al. Dataset Shift in Machine Learning , 2009 .
[15] R. Wilder,et al. Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..
[16] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[17] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[18] Jun Bi,et al. Source address validation solution with OpenFlow/NOX architecture , 2011, 2011 19th IEEE International Conference on Network Protocols.
[19] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[20] Kotagiri Ramamohanarao,et al. Layered Approach Using Conditional Random Fields for Intrusion Detection , 2010, IEEE Transactions on Dependable and Secure Computing.
[21] C. N. Liu,et al. Approximating discrete probability distributions with dependence trees , 1968, IEEE Trans. Inf. Theory.
[22] Mabry Tyson,et al. FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.
[23] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[24] Nick McKeown,et al. A network in a laptop: rapid prototyping for software-defined networks , 2010, Hotnets-IX.
[25] Mabry Tyson,et al. A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.
[26] Christopher Krügel,et al. Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..