Mitigation of Denial of Service (DoS) Attack
暂无分享,去创建一个
Juhi Jain | Zatin Gupta | Payal Jain | Zatin Gupta | J. Jain | P. Jain
[1] Richard Bassett,et al. Intrusion prevention systems: How do they prevent intrusion? , 2006 .
[2] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[3] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[4] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[5] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[6] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[7] David Slee. Common Denial of Service Attacks , 2007 .
[8] Helena Sandström,et al. A survey of the denial of service problem , 2001 .
[9] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[10] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[11] Sailesh Kumar,et al. Survey of Current Network Intrusion Detection Techniques , 2007 .
[12] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[13] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[14] Elizabeth D. Zwicky,et al. Building Internet firewalls (2nd ed.) , 2000 .
[15] Alex C. Snoeren,et al. Hash-based IP traceback , 2001, SIGCOMM '01.
[16] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[17] Daniel S. Yeung,et al. A covariance analysis model for DDoS attack detection , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[18] Mario Silva-Neto,et al. Netflow services and applications , 2002 .
[19] Shunzheng Yu,et al. A Novel Model for Detecting Application Layer DDoS Attacks , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[20] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[21] Yongdae Kim,et al. A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[22] D.S. Yeung,et al. DDoS detection based on feature space modeling , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[23] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[24] Wanlei Zhou,et al. Mark-aided distributed filtering by using neural network for DDoS defense , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[25] Osamu Nakamura,et al. Detection of denial of service attacks using AGURI , 2002 .
[26] Roch Guérin,et al. On the robustness of router-based denial-of-service (DoS) defense systems , 2005, CCRV.
[27] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[28] Fengmin Gong,et al. Deciphering Detection Techniques: Part III Denial of Service Detection , 2003 .
[29] B. Maglaris,et al. Efficiency and Performance Issues in Distributed Intrusion Detection Systems , 2002 .
[30] Dimitris Gavrilis,et al. Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features , 2005, Comput. Networks.
[31] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.