Effective Change Detection in Large Repositories of Unsolicited Traffic
暂无分享,去创建一个
Andrew Clark | Ejaz Ahmed | George Mohay | E. Ahmed | A. Clark | G. Mohay
[1] Xuxian Jiang,et al. Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.
[2] George M. Mohay,et al. A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic , 2008, 2008 IFIP International Conference on Network and Parallel Computing.
[3] Alexander G. Tartakovsky,et al. A novel approach to detection of \denial{of{service" attacks via adaptive sequential and batch{sequential change{point detection methods , 2001 .
[4] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[5] Kai Hwang,et al. Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.
[6] Youmin Zhang,et al. A novel variable‐length sliding window blockwise least‐squares algorithm for on‐line estimation of time‐varying parameters , 2004 .
[7] Udo W. Pooch,et al. Computer system and network security , 1995 .
[8] Christopher Leckie,et al. Hitlist Worm Detection using Source IP Address History. , 2006 .
[9] Ming Yu,et al. An adaptive method for anomaly detection in symmetric network traffic , 2007, Comput. Secur..
[10] F. Jahanian,et al. Practical Darknet Measurement , 2006, 2006 40th Annual Conference on Information Sciences and Systems.