作者: L. Li , G. Lee
DOI: 10.1109/ICCCN.2003.1284203
关键词: Computer science 、 Denial-of-service attack 、 Computer network 、 Anomaly (natural sciences) 、 Spike (software development) 、 Range (statistics) 、 Identification (information) 、 Internet traffic 、 Wavelet 、 Real-time computing 、 The Internet
摘要: … We utilize energy distribution based on wavelet analysis to detect DDoS attack traffic. … the traffic keeps its behavior over time (ie attack-free situation) while an introduction of attack traffic …