Monitoring the application-layer DDoS attacks for popular websites

作者: Yi Xie , Shun-Zheng Yu

DOI: 10.1109/TNET.2008.925628

关键词:

摘要: … Traditionally, DDoS attacks are carried out at the network layer, such as ICMP flooding, SYN … are called Net-DDoS attacks in this paper. The intent of these attacks is to consume the …

参考文章(26)
Wei Wang, Xiaohong Guan, Xiangliang Zhang, A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security Lecture Notes in Computer Science. pp. 657- 662 ,(2004) , 10.1007/978-3-540-28648-6_105
Ethan L. Miller, Darrell Long, Ismail Ari, Scott A. Brandt, Bo Hong, Modeling, Analysis and Simulation of Flash Crowds on the Internet ,(2004)
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering international conference on communications. ,vol. 1, pp. 482- 486 ,(2003) , 10.1109/ICC.2003.1204223
Shun-Zheng Yu, Zhen Liu, M.S. Squillante, Cathy Xia, Li Zhang, A hidden semi-Markov model for web workload self-similarity international performance computing and communications conference. pp. 65- 72 ,(2002) , 10.1109/IPCCC.2002.995137
Chris Roadknight, Ian Marshall, Debbie Vearer, File popularity characterisation measurement and modeling of computer systems. ,vol. 27, pp. 45- 50 ,(2000) , 10.1145/346000.346014
Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites the web conference. pp. 293- 304 ,(2002) , 10.1145/511446.511485
Yi Xie, Shun-zheng Yu, A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM computer supported cooperative work in design. pp. 1- 6 ,(2006) , 10.1109/CSCWD.2006.253054
Dina Katabi, Srikanth Kandula, Matthias Jacob, Arthur Berger, Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds networked systems design and implementation. pp. 287- 300 ,(2005) , 10.5555/1251203.1251224
Bin Xiao, Wei Chen, Yanxiang He, E.H.-M. Sha, An active detecting method against SYN flooding attack international conference on parallel and distributed systems. ,vol. 1, pp. 709- 715 ,(2005) , 10.1109/ICPADS.2005.67