Detection and defense of application-layer DDoS attacks in backbone web traffic
暂无分享,去创建一个
Wanlei Zhou | Weijia Jia | Wei Zhou | Yang Xiang | Sheng Wen | Wanlei Zhou | Y. Xiang | S. Wen | W. Jia | Wei Zhou
[1] Yi Xie,et al. A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network , 2012, J. Netw. Comput. Appl..
[2] Peter M. Chen,et al. ACM Transactions on Computer Systems: Editorial , 2010 .
[3] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[4] Xizhao Wang,et al. Covariance-Matrix Modeling and Detecting Various Flooding Attacks , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[5] Michael Walfish,et al. DDoS defense by offense , 2006, SIGCOMM 2006.
[6] Song Guo,et al. Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient , 2012, IEEE Transactions on Parallel and Distributed Systems.
[7] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[8] Jelena Mirkovic,et al. Modeling Human Behavior for Defense Against Flash-Crowd Attacks , 2009, 2009 IEEE International Conference on Communications.
[9] Mudhakar Srivatsa,et al. Mitigating application-level denial of service attacks on Web servers: A client-transparent approach , 2008, TWEB.
[10] Jie Yu,et al. A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks , 2007, International Conference on Networking and Services (ICNS '07).
[11] Dhruba Kumar Bhattacharyya,et al. Detection of HTTP flooding attacks in multiple scenarios , 2011, ICCCS '11.
[12] Sanjeev Khanna,et al. Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks , 2012, IEEE/ACM Transactions on Networking.
[13] Guanhua Yan,et al. Towards a bayesian network game framework for evaluating DDoS attacks and defense , 2012, CCS '12.
[14] Shunzheng Yu,et al. Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.
[15] Supranamaya Ranjan,et al. DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[16] Balachander Krishnamurthy,et al. On network-aware clustering of Web clients , 2000, SIGCOMM.
[17] Balachander Krishnamurthy,et al. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.
[18] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[19] Shun-Zheng Yu,et al. A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors , 2009, TNET.
[20] Urbashi Mitra,et al. Parametric Methods for Anomaly Detection in Aggregate Traffic , 2011, IEEE/ACM Transactions on Networking.
[21] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[22] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[23] Yi Xie,et al. Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior , 2013, IEEE Transactions on Parallel and Distributed Systems.
[24] Mikhail J. Atallah,et al. Adaptive data structures for IP lookups , 2005, JEAL.
[25] S. Agarwal,et al. DDoS Mitigation via Regional Cleaning Centers , 2003 .
[26] Andrei Z. Broder,et al. Using multiple hash functions to improve IP lookups , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[27] Aviel D. Rubin,et al. Defending against an Internet-based attack on the physical world , 2002, TOIT.
[28] Rami G. Melhem,et al. Live Baiting for Service-Level DoS Attackers , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[29] Ali A. Ghorbani,et al. Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..
[30] I. Sasase,et al. Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[31] Hervé Debar,et al. Processing intrusion detection alert aggregates with time series modeling , 2009, Inf. Fusion.
[32] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.