Robust and efficient detection of DDoS attacks for large-scale internet
暂无分享,去创建一个
Antonio Nucci | Kejie Lu | Dapeng Wu | Sinisa Todorovic | Jieyan Fan | S. Todorovic | D. Wu | A. Nucci | K. Lu | Jieyan Fan
[1] Marina Vannucci,et al. Detecting Traffic Anomalies Using Discrete Wavelet Transform , 2004, ICOIN.
[2] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[3] Alexander G. Tartakovsky,et al. A novel approach to detection of \denial{of{service" attacks via adaptive sequential and batch{sequential change{point detection methods , 2001 .
[4] Edward J. Wegman,et al. Statistical Signal Processing , 1985 .
[5] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[6] H. T. Kung,et al. Use of spectral analysis in defense against DoS attacks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[7] Brendan J. Frey,et al. Graphical Models for Machine Learning and Digital Communication , 1998 .
[8] Dwen-Ren Tsai,et al. A hybrid intelligent intrusion detection system to recognize novel attacks , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[9] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[10] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[11] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[12] Andrew H. Sung,et al. Detecting denial of service attacks using support vector machines , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[13] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[14] Kathleen M. Carley,et al. Characterization of defense mechanisms against distributed denial of service attacks , 2004, Comput. Secur..
[15] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[16] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[17] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[18] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[19] Dawn Xiaodong Song,et al. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense , 2006, IEEE Journal on Selected Areas in Communications.
[20] G ShinKang,et al. Change-Point Monitoring for the Detection of DoS Attacks , 2004 .
[21] Kotagiri Ramamohanarao,et al. Protection from distributed denial of service attacks using history-based IP filtering , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[22] Shigang Chen,et al. Perimeter-based defense against high bandwidth DDoS attacks , 2005, IEEE Transactions on Parallel and Distributed Systems.
[23] Kotagiri Ramamohanarao,et al. Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.
[24] Mark Crovella,et al. Graph wavelets for spatial traffic analysis , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).