Profiling DRDoS Attacks with Data Analytics Pipeline

作者: Laure Berti-Equille , Yury Zhauniarovich

DOI: 10.1145/3132847.3133155

关键词:

摘要: … Third, from the consensus clusters we have obtained, we can discover a posteriori M5 and decision tree-based rules explaining attack clusters’ characteristics that we will further enable …

参考文章(15)
Armin Büscher, Thorsten Holz, Tracking DDoS attacks: insights into the business of disrupting the web usenix conference on large scale exploits and emergent threats. pp. 8- 8 ,(2012)
Mohammad Karami, Youngsam Park, Damon McCoy, Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services the web conference. pp. 1033- 1043 ,(2016) , 10.1145/2872427.2883004
Christian Rossow, Amplification Hell: Revisiting Network Protocols for DDoS Abuse network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23233
SANDRO VEGA-PONS, JOSÉ RUIZ-SHULCLOPER, A SURVEY OF CLUSTERING ENSEMBLE ALGORITHMS International Journal of Pattern Recognition and Artificial Intelligence. ,vol. 25, pp. 337- 372 ,(2011) , 10.1142/S0218001411008683
Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz, Going Wild: Large-Scale Classification of Open DNS Resolvers internet measurement conference. pp. 355- 368 ,(2015) , 10.1145/2815675.2815683
Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, Manish Karir, None, Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks internet measurement conference. pp. 435- 448 ,(2014) , 10.1145/2663716.2663717
Arne Welzel, Christian Rossow, Herbert Bos, On measuring the impact of DDoS botnets european workshop on system security. pp. 3- ,(2014) , 10.1145/2592791.2592794
José Jair Santanna, Roland van Rijswijk-Deij, Anna Sperotto, Rick Hofstede, Mark Wierbosch, Lisandro Zambenedetti Granville, Aiko Pras, José Jair Santanna, Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras, Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras, Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras, Booters — An analysis of DDoS-as-a-service attacks integrated network management. pp. 243- 251 ,(2015) , 10.1109/INM.2015.7140298
Stephen M. Specht, Ruby B. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures ISCA PDCS. pp. 543- 550 ,(2004)
T. Kanungo, D.M. Mount, N.S. Netanyahu, C.D. Piatko, R. Silverman, A.Y. Wu, An efficient k-means clustering algorithm: analysis and implementation IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 24, pp. 881- 892 ,(2002) , 10.1109/TPAMI.2002.1017616