注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Distributed Data Aggregation Technology for Real-Time DDoS Attacks Detection
作者: Yu Chen ,
Wei-Shinn Ku
DOI:
10.4018/978-1-60566-010-3.CH109
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
2
下载资源
2
uni-trier.de
本地加速
igi-global.com
本地加速
uni-trier.de
PDF
下载加速
sci-hub.st
HTML
下载加速
参考文章
(13)
1.
Min Cai, Kai Hwang, Jianping Pan, Christos Papadopoulos,
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
IEEE Transactions on Dependable and Secure Computing.
,vol. 4, pp. 88- 104 ,(2007) ,
10.1109/TDSC.2007.1000
2.
Michalis Faloutsos, Petros Faloutsos, Christos Faloutsos,
On power-law relationships of the Internet topology
acm special interest group on data communication.
,vol. 29, pp. 251- 262 ,(1999) ,
10.1145/316188.316229
3.
Naoum Naoumov, Keith Ross,
Exploiting P2P systems for DDoS attacks
scalable information systems.
pp. 47- ,(2006) ,
10.1145/1146847.1146894
4.
Jelena Mirkovic, Peter Reiher,
A taxonomy of DDoS attack and DDoS defense mechanisms
acm special interest group on data communication.
,vol. 34, pp. 39- 53 ,(2004) ,
10.1145/997150.997156
5.
A. Chakrabarti, G. Manimaran,
Internet infrastructure security: a taxonomy
IEEE Network.
,vol. 16, pp. 13- 21 ,(2002) ,
10.1109/MNET.2002.1081761
6.
G. Siganos, M. Faloutsos, P. Faloutsos, C. Faloutsos,
Power laws and the AS-level Internet topology
IEEE ACM Transactions on Networking.
,vol. 11, pp. 514- 524 ,(2003) ,
10.1109/TNET.2003.815300
7.
M. Attig, J. Lockwood,
A framework for rule processing in reconfigurable network systems
field-programmable custom computing machines.
pp. 225- 234 ,(2005) ,
10.1109/FCCM.2005.7
8.
J. Zhao, R. Govindan, D. Estrin,
Computing aggregates for monitoring wireless sensor networks
Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
pp. 139- 148 ,(2003) ,
10.1109/SNPA.2003.1203364
9.
L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred,
Statistical approaches to DDoS attack detection and response
darpa information survivability conference and exposition.
,vol. 1, pp. 303- 314 ,(2003) ,
10.1109/DISCEX.2003.1194894
10.
G. Carl, G. Kesidis, R.R. Brooks, Suresh Rai,
Denial-of-service attack-detection techniques
IEEE Internet Computing.
,vol. 10, pp. 82- 89 ,(2006) ,
10.1109/MIC.2006.5
来源期刊
Encyclopedia of Data Warehousing and Mining
IGI Global
2009 年,
Volume: , Issue: ,
Page: 701-708
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...