Detecting Asymmetric Application-layer Denial-of-Service Attacks In-Flight with Finelame.

作者: Vincent Liu , Boon Thau Loo , Linh Thi Xuan Phan , Nikos Vasilakis , Isaac Pedisich

DOI:

关键词: Denial-of-service attackApplication layerComputer securityComputer science

摘要:

参考文章(30)
Richard Mortier, Rebecca Isaacs, Dushyanth Narayanan, Paul Barham, Magpie: online modelling and performance-aware systems hot topics in operating systems. pp. 15- 15 ,(2003)
Seyed Kaveh Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael Bailey, None, Bohatei: flexible and elastic DDoS defense usenix security symposium. ,vol. 2015, pp. 817- 832 ,(2015)
Mona Attariyan, Jason Flinn, Michael Chow, X-ray: automating root-cause diagnosis of performance anomalies in production software operating systems design and implementation. pp. 307- 320 ,(2012) , 10.5555/2387880.2387910
Scott Shenker, George Porter, Ion Stoica, Randy H. Katz, Rodrigo Fonseca, X-trace: a pervasive network tracing framework networked systems design and implementation. pp. 20- 20 ,(2007)
Scott A. Crosby, Dan S. Wallach, Denial of service via algorithmic complexity attacks usenix security symposium. pp. 3- 3 ,(2003)
Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G. Griswold, An Overview of AspectJ ECOOP 2001 — Object-Oriented Programming. pp. 327- 354 ,(2001) , 10.1007/3-540-45337-7_18
Peter Bodik, Jonathan Mace, Madanlal Musuvathi, Rodrigo Fonseca, Retro: Targeted resource management in multi-tenant distributed systems networked systems design and implementation. pp. 589- 603 ,(2015)
Ahren Studer, Adrian Perrig, The Coremelt attack european symposium on research in computer security. pp. 37- 52 ,(2009) , 10.1007/978-3-642-04444-1_3
Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, Yu Li, Real-time detection of application-layer DDoS attack using time series analysis Journal of Control Science and Engineering. ,vol. 2013, pp. 4- ,(2013) , 10.1155/2013/821315
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems ACM Computing Surveys. ,vol. 39, pp. 3- ,(2007) , 10.1145/1216370.1216373