![]() ![]() ![]() Keunsoo, L., Juhyun, K., Ki, H.K., et al.: DDoS attack detection method using cluster analysis. Wang, H., Zhang, D., Shin, K.G., Detecting, S.Y.N.: flooding attacks. In: Proceedings of the 10th USENIX Security Symposium (2001) Gil, T.M., Poletto, M.: MULTOPS: A data-structure for bandwidth attack detection. Sanguk, N., Gihyun, J., Kyunghee, C., et al.: Compiling network traffic into rules using soft computing methods for the detection of flooding attacks. Rep: Schectades, New York (2001)ĭongqing, Z., Haifeng, Z., Shaowu, Z., et al.: A DDoS Attack Detection Method Based on Hidden Markov Model. Kulkarni, A., Bush, S., Evans, S.: Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics. In: Proceedings of ACM SIGCOMM, Portland, Oregon, USA (August 2004) Lakhina, A., Crovella, M., Diot, C.: Diagnosing Network-Wide Traffic Anomalies. Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: A statistical anomaly approach. In: Proceedings of IEEE GLOBECOM 2002, pp. (2005), Ĭheng, C.M., Kung, H.T., Tan, K.S.: Use of spectral analysis in defense against DoS attacks. Handley, M.: DoS-resistant Internet subgroup report. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |