Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server
暂无分享,去创建一个
[1] B. B. Gupta,et al. An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach , 2012, ArXiv.
[2] Bo Lang,et al. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey , 2019, Applied Sciences.
[3] Geert Deconinck,et al. Analyzing well-known countermeasures against distributed denial of service attacks , 2012, Comput. Commun..
[4] Albert G. Greenberg,et al. Data center TCP (DCTCP) , 2010, SIGCOMM '10.
[5] V. Kamakshi Prasad,et al. Detecting and Preventing IP-spoofed DDoS Attacks by Encrypted Marking Based Detection and Filtering (EMDAF) , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[6] Songjie Wei,et al. Benchmarks for DDOS Defense Evaluation , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[7] Wu Zhijun,et al. Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey , 2020, IEEE Access.
[8] Martine Bellaïche,et al. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing , 2017, Future Internet.
[9] Claes Wohlin,et al. Experimentation in software engineering: an introduction , 2000 .
[10] Sonia Fahmy,et al. Towards user-centric metrics for denial-of-service measurement , 2007, ExpCS '07.
[11] Marcello Cinque,et al. Contextual filtering and prioritization of computer application logs for security situational awareness , 2020, Future Gener. Comput. Syst..
[12] A. Pravin Renold,et al. Distributed detection of flooding and gray hole attacks in Wireless Sensor Network , 2015, 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).
[13] Lukas Malina,et al. On Detection and Mitigation of Slow Rate Denial of Service Attacks , 2019, 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[14] Umberto Villano,et al. Towards a Framework for Improving Experiments on DoS Attacks , 2020, QUATIC.
[15] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[16] Neminath Hubballi,et al. Slow rate denial of service attacks against HTTP/2 and detection , 2018, Comput. Secur..
[17] Aamir Shahzad,et al. Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach , 2013, ICUIMC '13.
[18] Sunny Behal,et al. Characterization and comparison of Distributed Denial of Service attack tools , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[19] Maurizio Mongelli,et al. An on-line intrusion detection approach to identify low-rate DoS attacks , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).
[20] Yang Xiao,et al. A survey of distributed denial-of-service attack, prevention, and mitigation techniques , 2017, Int. J. Distributed Sens. Networks.
[21] Cristina Conde,et al. Detecting denial of service by modelling web-server behaviour , 2013, Comput. Electr. Eng..
[22] Kiattikul Treseangrat,et al. Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13 , 2015, 2015 International Conference on Computer, Information and Telecommunication Systems (CITS).
[23] Santosh Biswas,et al. Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization , 2014, International Journal of Machine Learning and Cybernetics.
[24] Bokyoung Kang,et al. Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential KNN Voting Approach , 2015, Int. J. Distributed Sens. Networks.
[25] Panayiotis Kotzanikolaou,et al. Evaluating security controls against HTTP-based DDoS attacks , 2013, IISA 2013.
[26] Taghi M. Khoshgoftaar,et al. Utilizing Netflow Data to Detect Slow Read Attacks , 2018, 2018 IEEE International Conference on Information Reuse and Integration (IRI).
[27] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.