Synflood Spoofed Source DDoS Attack Defense Based on Packet ID Anomaly Detection with Bloom Filter
暂无分享,去创建一个
[1] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[2] C. Rama Krishna,et al. Mitigation Of Ddos Attacks Using Probability Based Distributed Hop Count Filtering And Round Trip Time , 2013 .
[4] Awadhesh Kumar Singh,et al. Entropy-score: A method to detect DDoS attack and flash crowd , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[5] Van Khanh Nguyen,et al. Synflood Spoof Source DDOS Attack Defence Based on Packet ID Anomaly Detection – PIDAD , 2016 .
[6] Oguz Yilmaz,et al. A classification approach for adaptive mitigation of SYN flood attacks: Preventing performance loss due to SYN flood attacks , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[7] Jung-Min Park,et al. NISp1-05: RIM: Router Interface Marking for IP Traceback , 2006, IEEE Globecom 2006.
[8] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Steven J. Templeton,et al. Detecting spoofed packets , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[10] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[11] Bibhudatta Sahoo,et al. Mitigating DDoS attack and Saving Computational Time using a Probabilistic approach and HCF method , 2009, 2009 IEEE International Advance Computing Conference.
[12] Mqhele E. Dlodlo,et al. TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment , 2015, IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON).
[13] Toshio Hirotsu,et al. Design and Implementation of an OpenFlow-Based TCP SYN Flood Mitigation , 2018, 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).
[14] Christopher Leckie,et al. An efficient filter for denial-of-service bandwidth attacks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[15] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.