Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2
暂无分享,去创建一个
[1] Kuldip Singh,et al. Performance Analysis of Web Service under DDoS Attacks , 2009, 2009 IEEE International Advance Computing Conference.
[2] Andreas Terzis,et al. My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging , 2007, HotBots.
[3] Hong Li,et al. Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching , 2015, Secur. Commun. Networks.
[4] Martine Bellaïche,et al. Avoiding DDoS with active management of backlog queues , 2011, 2011 5th International Conference on Network and System Security.
[5] Robert E. McGrath,et al. Web server technology: the advanced guide for World Wide Web information providers , 1996 .
[6] Hidema Tanaka,et al. Analysis of Slow Read DoS attack , 2014, 2014 International Symposium on Information Theory and its Applications.
[7] Vivek Nigam,et al. A Selective Defense for Application Layer DDoS Attacks , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[8] Massimiliano Rak,et al. Intrusion Tolerant Approach for Denial of Service Attacks to Web Services , 2011, 2011 First International Conference on Data Compression, Communications and Processing.
[9] Wanlei Zhou,et al. Detection and defense of application-layer DDoS attacks in backbone web traffic , 2014, Future Gener. Comput. Syst..
[10] Zhoujun Li,et al. A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks , 2009, Infoscale.
[11] Jun Xu,et al. Sustaining Availability of Web Services under Distributed Denial of Service Attacks , 2003, IEEE Trans. Computers.
[12] Kuldip Singh,et al. DDoS Incidents and their Impact: A Review , 2010, Int. Arab J. Inf. Technol..
[13] Alfred V. Aho,et al. The awk programming language , 1988 .
[14] L. Schwartz,et al. Sophisticated Denial of Service attacks aimed at application layer , 2012, 2012 ELEKTRO.
[15] Ali A. Ghorbani,et al. A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends ............................................................................................. YUXIN MENG, WENJUAN LI, AND LAM-FOR KWOK , 2014 .
[16] Muhammad Kamran Asif,et al. DDoS attacks and countermeasures in cyberspace , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).
[17] Hikmat Farhat. Protecting TCP services from denial of service attacks , 2006, LSAD '06.
[18] Song Guo,et al. Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace , 2015, IEEE Transactions on Computers.
[19] Chengxu Ye,et al. Detection of application layer distributed denial of service , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.
[20] Maurizio Aiello,et al. Taxonomy of Slow DoS Attacks to Web Applications , 2012, SNDS.
[21] Supranamaya Ranjan,et al. DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[22] Shun-Zheng Yu,et al. Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.
[23] Yue Meng. Research on the performance of low-rate DoS attack , 2008 .
[24] Juho Kim,et al. DDoS avoidance strategy for service availability , 2011, Cluster Computing.
[25] Jens Mache,et al. Hands-on denial of service lab exercises using SlowLoris and RUDY , 2012, InfoSecCD.
[26] Sonia Fahmy,et al. Towards user-centric metrics for denial-of-service measurement , 2007, ExpCS '07.
[27] Muhammad Arif,et al. Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense , 2013 .
[28] Shian-Shyong Tseng,et al. Constructing detection knowledge for DDoS intrusion tolerance , 2004, Expert Syst. Appl..
[29] Indrakshi Ray,et al. A Responsive Defense Mechanism Against DDoS Attacks , 2014, FPS.
[30] Abhinav Bhandari,et al. Simulation study of application layer DDoS attack , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[31] Geert Deconinck,et al. Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[32] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.