Protecting Web Servers from Distributed Denial of Service Attack
暂无分享,去创建一个
[1] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[2] Michael Kistler,et al. The case for power management in web servers , 2002 .
[3] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[4] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[5] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[6] Wayne Salamon,et al. Implementing SELinux as a Linux Security Module , 2003 .
[7] Kevin Skadron,et al. Power-aware QoS management in Web servers , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[8] Christopher Krügel,et al. A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.
[9] James C. Foster,et al. Web Server & Web Application Testing , 2005 .
[10] Hui Zang,et al. Is sampled data sufficient for anomaly detection? , 2006, IMC '06.
[11] R. H. Myers,et al. STAT 319 : Probability & Statistics for Engineers & Scientists Term 152 ( 1 ) Final Exam Wednesday 11 / 05 / 2016 8 : 00 – 10 : 30 AM , 2016 .
[12] Ken Coar,et al. Apache cookbook - solutions and examples for Apache administrators (2. ed.) , 2007 .
[13] Errin W. Fulp,et al. A taxonomy of parallel techniques for intrusion detection , 2007, ACM-SE 45.
[14] Vadim Okun,et al. Web Application Scanners: Definitions and Functions , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[15] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[16] Sandeep K. S. Gupta,et al. Measurement-based power profiling of data center equipment , 2007, CLUSTER.
[17] Wanlei Zhou,et al. Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[18] M. Milvich,et al. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS) , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[19] Christie I. Ezeife,et al. SensorWebIDS: a web mining intrusion detection system , 2008, Int. J. Web Inf. Syst..
[20] Stephen Smalley,et al. Configuring the SELinux Policy , 2008 .
[21] Fakhri Karray,et al. TCP/IP Model and Intrusion Detection Systems , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[22] Fakhri Karray,et al. Lightweight IDS Based on Features Selection and IDS Classification Scheme , 2009, 2009 International Conference on Computational Science and Engineering.
[23] Wang Qinquan,et al. Research on Network Attack and Detection Methods , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[24] Chi-Chun Lo,et al. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.
[25] Hossein Rouhani Zeidanloo,et al. A taxonomy of Botnet detection techniques , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[26] Ali A. Ghorbani,et al. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS 1 Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods , 2022 .
[27] Sotiris Ioannidis,et al. MIDeA: a multi-parallel intrusion detection architecture , 2011, CCS '11.
[28] Mohammad Zulkernine,et al. Server Side Detection of Content Sniffing Attacks , 2011, 2011 IEEE 22nd International Symposium on Software Reliability Engineering.
[29] S. Khan,et al. Energy-efficient Resource Utilization in Cloud Computing , 2011 .
[30] Jongsoo Jang,et al. AIGG Threshold Based HTTP GET Flooding Attack Detection , 2012, WISA.
[31] Elizabeth L. Unrein. LIVING IN DENIAL-A COMPARISON OF DISTRIBUTED DENIAL OF SERVICE MITIGATION METHODS , 2012 .
[32] Martin J. Reed,et al. Methodologies for detecting DoS/DDoS attacks against network servers , 2012, ICSNC 2012.
[33] Lwin Khin Shar,et al. Defending against Cross-Site Scripting Attacks , 2012, Computer.
[34] Sujatha Sivabalan,et al. A novel framework to detect and block DDoS attack at the application layer , 2013, IEEE 2013 Tencon - Spring.
[35] Maninder Singh,et al. Automatic attack signature generation systems: A review , 2013, IEEE Security & Privacy.
[36] Junho Choi,et al. Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment , 2013, J. Internet Serv. Inf. Secur..
[37] Vijay D. Katkar,et al. Experiments on detection of Denial of Service attacks using Naive Bayesian classifier , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).
[38] Youssef Iraqi,et al. Phishing Detection: A Literature Survey , 2013, IEEE Communications Surveys & Tutorials.
[39] Vijay D. Katkar,et al. Lightweight approach for detection of denial of service attacks using numeric to binary preprocessing , 2014, 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).
[40] Saeed M. Alqahtani,et al. An Intelligent Intrusion Detection System for Cloud Computing (SIDSCC) , 2014, 2014 International Conference on Computational Science and Computational Intelligence.
[41] Marco Vieira,et al. Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection , 2014, IEEE Transactions on Dependable and Secure Computing.
[42] Novia Admodisastro,et al. Current state of research on cross-site scripting (XSS) - A systematic literature review , 2015, Inf. Softw. Technol..
[43] S Sivabalan,et al. Real time calibration of DDoS blocking rules for Web Servers , 2016 .
[44] Peter J. Radcliffe,et al. Detecting IoT zombie attacks on web servers , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[45] Peter J. Radcliffe,et al. Feasibility of Eliminating IDPS Devices from a Web Server Farm , 2018, Int. J. Netw. Secur..
[46] Peter J. Radcliffe,et al. Power Efficient Secure Web Servers , 2018, Int. J. Netw. Secur..