Detection of DDoS attacks using optimized traffic matrix

作者: Sang Min Lee , Dong Seong Kim , Je Hak Lee , Jong Sou Park

DOI: 10.1016/J.CAMWA.2011.08.020

关键词:

摘要: … traffic matrix by extracting source IP addresses from an inbound traffic stream and locate packets to the traffic matrix … the traffic matrix and the number of packets for one traffic matrix are …

参考文章(16)
B. E. Brodsky, B. S. Darkhovsky, Nonparametric methods in change-point problems Kluwer Academic Publishers. ,(1993) , 10.1007/978-94-015-8163-9
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Proactively detecting distributed denial of service attacks using source IP address monitoring Lecture Notes in Computer Science. pp. 771- 782 ,(2004) , 10.1007/978-3-540-24693-0_63
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Tae Hwan Kim, Dong Seong Kim, Sang Min Lee, Jong Sou Park, Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average information security and assurance. pp. 290- 300 ,(2009) , 10.1007/978-3-642-02617-1_30
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
R. Talpade, G. Kim, S. Khurana, NOMAD: traffic-based network monitoring framework for anomaly detection international symposium on computers and communications. pp. 442- 451 ,(1999) , 10.1109/ISCC.1999.780942
Jelena Mirkovic, Peter Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms acm special interest group on data communication. ,vol. 34, pp. 39- 53 ,(2004) , 10.1145/997150.997156
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh, Baseline Profile Stability for Network Anomaly Detection international conference on information technology new generations. pp. 720- 725 ,(2006) , 10.1109/ITNG.2006.38
Haining Wang, Danlu Zhang, Kang G. Shin, Detecting SYN flooding attacks international conference on computer communications. ,vol. 3, pp. 1530- 1539 ,(2002) , 10.1109/INFCOM.2002.1019404