DDoS Attack Detection and Wavelets
暂无分享,去创建一个
[1] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[2] Richard G. Baraniuk,et al. Connection-level analysis and modeling of network traffic , 2001, IMW '01.
[3] Murad S. Taqqu,et al. On the Self-Similar Nature of Ethernet Traffic , 1993, SIGCOMM.
[4] Ingrid Daubechies,et al. The wavelet transform, time-frequency localization and signal analysis , 1990, IEEE Trans. Inf. Theory.
[5] Xiaoyan Hong,et al. Contradictory relationship between Hurst parameter and queueing performance (extended version) , 2001, Telecommun. Syst..
[6] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[7] Patrice Abry,et al. Wavelet Analysis of Long-Range-Dependent Traffic , 1998, IEEE Trans. Inf. Theory.
[8] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[9] Zhi-Li Zhang,et al. Small-time scaling behaviors of Internet backbone traffic: an empirical study , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.
[11] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[12] Richard G. Baraniuk,et al. A Multifractal Wavelet Model with Application to Network Traffic , 1999, IEEE Trans. Inf. Theory.
[13] Matthew Roughan,et al. Real-time estimation of the parameters of long-range dependence , 2000, TNET.
[14] Chuanyi Ji,et al. Modeling heterogeneous network traffic in wavelet domain , 2001, TNET.
[15] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[16] Jie Wu,et al. A unified framework for understanding network traffic using independent wavelet models , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[17] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[18] Paul Barford,et al. Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.
[19] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[20] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[21] Patrice Abry,et al. Long‐range Dependence: Revisiting Aggregation with Wavelets , 1998 .
[22] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.