Change-point monitoring for the detection of DoS attacks

作者: Haining Wang , Danlu Zhang , K.G. Shin

DOI: 10.1109/TDSC.2004.34

关键词: Airfield traffic patternComputer networkCUSUMComputer scienceDenial-of-service attackIntrusion detection systemCommunications protocolSYN floodFlooding (computer networking)Real-time computingChange detection

摘要: … a simple and robust mechanism, called Change-Point Monitoring (CPM), to detect denial of … and is an instance of the Sequential Change Point Detection. To make the detection …

参考文章(56)
Robert Stone, Centertrack: an IP overlay network for tracking DoS floods usenix security symposium. pp. 15- 15 ,(2000)
B. E. Brodsky, B. S. Darkhovsky, Nonparametric methods in change-point problems Kluwer Academic Publishers. ,(1993) , 10.1007/978-94-015-8163-9
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Steven Michael Bellovin, John Ioannidis, Implementing Pushback : Router-Based Defense Against DDoS Attacks network and distributed system security symposium. ,(2002) , 10.7916/D8R78MXV
Thomer M. Gil, Massimiliano Poletto, MULTOPS: a data-structure for bandwidth attack detection usenix security symposium. pp. 3- 3 ,(2001) , 10.21236/ADA401819
Vern Paxson, Christian Kreibich, Mark Handley, Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics usenix security symposium. pp. 9- 9 ,(2001)
Geoffrey M. Voelker, Stefan Savage, David Moore, Inferring internet denial-of-service activity usenix security symposium. pp. 2- 2 ,(2001)
Steven Bellovin, Marcus Leech, Tom Taylor, ICMP Traceback Messages Internet Draft: draft-bellovin-itrace-00. txt. ,(2003) , 10.7916/D8FF406R
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)