Protecting Web Servers from Distributed Denial of Service Attack

................................................................................................................................................... 1

[1]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[2]  Michael Kistler,et al.  The case for power management in web servers , 2002 .

[3]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..

[4]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[5]  A.H. Sung,et al.  Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..

[6]  Wayne Salamon,et al.  Implementing SELinux as a Linux Security Module , 2003 .

[7]  Kevin Skadron,et al.  Power-aware QoS management in Web servers , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[8]  Christopher Krügel,et al.  A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.

[9]  James C. Foster,et al.  Web Server & Web Application Testing , 2005 .

[10]  Hui Zang,et al.  Is sampled data sufficient for anomaly detection? , 2006, IMC '06.

[11]  R. H. Myers,et al.  STAT 319 : Probability & Statistics for Engineers & Scientists Term 152 ( 1 ) Final Exam Wednesday 11 / 05 / 2016 8 : 00 – 10 : 30 AM , 2016 .

[12]  Ken Coar,et al.  Apache cookbook - solutions and examples for Apache administrators (2. ed.) , 2007 .

[13]  Errin W. Fulp,et al.  A taxonomy of parallel techniques for intrusion detection , 2007, ACM-SE 45.

[14]  Vadim Okun,et al.  Web Application Scanners: Definitions and Functions , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[15]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[16]  Sandeep K. S. Gupta,et al.  Measurement-based power profiling of data center equipment , 2007, CLUSTER.

[17]  Wanlei Zhou,et al.  Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[18]  M. Milvich,et al.  Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS) , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[19]  Christie I. Ezeife,et al.  SensorWebIDS: a web mining intrusion detection system , 2008, Int. J. Web Inf. Syst..

[20]  Stephen Smalley,et al.  Configuring the SELinux Policy , 2008 .

[21]  Fakhri Karray,et al.  TCP/IP Model and Intrusion Detection Systems , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[22]  Fakhri Karray,et al.  Lightweight IDS Based on Features Selection and IDS Classification Scheme , 2009, 2009 International Conference on Computational Science and Engineering.

[23]  Wang Qinquan,et al.  Research on Network Attack and Detection Methods , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[24]  Chi-Chun Lo,et al.  A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[25]  Hossein Rouhani Zeidanloo,et al.  A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[26]  Ali A. Ghorbani,et al.  IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS 1 Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods , 2022 .

[27]  Sotiris Ioannidis,et al.  MIDeA: a multi-parallel intrusion detection architecture , 2011, CCS '11.

[28]  Mohammad Zulkernine,et al.  Server Side Detection of Content Sniffing Attacks , 2011, 2011 IEEE 22nd International Symposium on Software Reliability Engineering.

[29]  S. Khan,et al.  Energy-efficient Resource Utilization in Cloud Computing , 2011 .

[30]  Jongsoo Jang,et al.  AIGG Threshold Based HTTP GET Flooding Attack Detection , 2012, WISA.

[31]  Elizabeth L. Unrein LIVING IN DENIAL-A COMPARISON OF DISTRIBUTED DENIAL OF SERVICE MITIGATION METHODS , 2012 .

[32]  Martin J. Reed,et al.  Methodologies for detecting DoS/DDoS attacks against network servers , 2012, ICSNC 2012.

[33]  Lwin Khin Shar,et al.  Defending against Cross-Site Scripting Attacks , 2012, Computer.

[34]  Sujatha Sivabalan,et al.  A novel framework to detect and block DDoS attack at the application layer , 2013, IEEE 2013 Tencon - Spring.

[35]  Maninder Singh,et al.  Automatic attack signature generation systems: A review , 2013, IEEE Security & Privacy.

[36]  Junho Choi,et al.  Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment , 2013, J. Internet Serv. Inf. Secur..

[37]  Vijay D. Katkar,et al.  Experiments on detection of Denial of Service attacks using Naive Bayesian classifier , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).

[38]  Youssef Iraqi,et al.  Phishing Detection: A Literature Survey , 2013, IEEE Communications Surveys & Tutorials.

[39]  Vijay D. Katkar,et al.  Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing , 2014, 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).

[40]  Saeed M. Alqahtani,et al.  An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC) , 2014, 2014 International Conference on Computational Science and Computational Intelligence.

[41]  Marco Vieira,et al.  Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection , 2014, IEEE Transactions on Dependable and Secure Computing.

[42]  Novia Admodisastro,et al.  Current state of research on cross-site scripting (XSS) - A systematic literature review , 2015, Inf. Softw. Technol..

[43]  S Sivabalan,et al.  Real time calibration of DDoS blocking rules for Web Servers , 2016 .

[44]  Peter J. Radcliffe,et al.  Detecting IoT zombie attacks on web servers , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[45]  Peter J. Radcliffe,et al.  Feasibility of Eliminating IDPS Devices from a Web Server Farm , 2018, Int. J. Netw. Secur..

[46]  Peter J. Radcliffe,et al.  Power Efficient Secure Web Servers , 2018, Int. J. Netw. Secur..