Evaluation of a low-rate DoS attack against application servers
暂无分享,去创建一个
[1] Nirwan Ansari,et al. A router-based technique to mitigate reduction of quality (RoQ) attacks , 2008, Comput. Networks.
[2] Sándor Molnár,et al. On the distribution of round-trip delays in TCP/IP networks , 1999, Proceedings 24th Conference on Local Computer Networks. LCN'99.
[3] Mina Guirguis,et al. Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[4] Markus Hofmann,et al. Content Networking - Architecture, Protocols, and Practice , 2005, The Morgan Kaufmann series in networking.
[5] Paul Albitz,et al. DNS and BIND , 1994 .
[6] Andrew B. Whinston,et al. Defeating distributed denial of service attacks , 2000 .
[7] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[8] J. M. Pullen,et al. Countering denial-of-service attacks using congestion triggered packet sampling and filtering , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[9] Gabriel Maciá-Fernández,et al. Evaluation of a low-rate DoS attack against iterative servers , 2007, Comput. Networks.
[10] Linda Pesante,et al. CERT® Coordination Center , 2002 .
[11] Mina Guirguis,et al. Exploiting the transients of adaptation for RoQ attacks on Internet resources , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[12] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[13] Ming Li,et al. Change trend of averaged Hurst parameter of traffic under DDOS flood attacks , 2006, Comput. Secur..
[14] Srinivasan Parthasarathy,et al. Customized Dynamic Load Balancing for a Network of Workstations , 1997, J. Parallel Distributed Comput..
[15] Aleksandar Kuzmanovic,et al. Low-rate TCP-targeted denial of service attacks and counter strategies , 2006, TNET.
[16] Yuting Zhang,et al. Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[17] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[18] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[19] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[20] Zhen Liu,et al. Traffic model and performance evaluation of Web servers , 2001, Perform. Evaluation.
[21] Ming Li,et al. A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates , 2006, ATC.
[22] Mun Choon Chan,et al. Effect of Malicious Synchronization , 2006, ACNS.
[23] Ming Li,et al. An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition , 2004, Comput. Secur..
[24] Yuting Zhang,et al. Adversarial exploits of end-systems adaptation dynamics , 2007, J. Parallel Distributed Comput..
[25] Philippe Owezarski,et al. Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies , 2007, IEEE Transactions on Dependable and Secure Computing.
[26] T. T. Soong,et al. Fundamentals of Probability and Statistics for Engineers , 2004 .
[27] Balachander Krishnamurthy,et al. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.
[28] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, GLOBECOM.