Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs: Design for a Safer Adaptive Infrastructure

作者: Pablo Pessoa Do Nascimento , Isac FAF Colares , Ronierison Maciel , Humberto Caetano Da Silva , Paulo Maciel

DOI: 10.4018/978-1-7998-5728-0.CH025

关键词:

摘要:

参考文章(33)
Thomer M. Gil, Massimiliano Poletto, MULTOPS: a data-structure for bandwidth attack detection usenix security symposium. pp. 3- 3 ,(2001) , 10.21236/ADA401819
Jema David Ndibwile, A. Govardhan, Kazuya Okada, Youki Kadobayashi, Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication computer software and applications conference. ,vol. 3, pp. 261- 267 ,(2015) , 10.1109/COMPSAC.2015.240
Khundrakpam Johnson Singh, Tanmay De, DDOS Attack Detection and Mitigation Technique Based on Http Count and Verification Using CAPTCHA computational intelligence. pp. 196- 197 ,(2015) , 10.1109/CINE.2015.47
Z. Chen, Z. Chen, A. Delis, An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks The Computer Journal. ,vol. 50, pp. 7- 40 ,(2007) , 10.1093/COMJNL/BXL042
Lance Cleghorn, Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth Journal of Information Security. ,vol. 4, pp. 144- 149 ,(2013) , 10.4236/JIS.2013.43017
Moti Geva, Amir Herzberg, Yehoshua Gev, Bandwidth Distributed Denial of Service: Attacks and Defenses ieee symposium on security and privacy. ,vol. 12, pp. 54- 61 ,(2014) , 10.1109/MSP.2013.55
Liwei Yuan, Weichao Xing, Haibo Chen, Binyu Zang, Security breaches as PMU deviation: detecting and identifying security attacks using performance counters asia pacific workshop on systems. pp. 6- 6 ,(2011) , 10.1145/2103799.2103807
E.Y. Chen, A. Yonezawa, Practical techniques for defending against DDoS attacks acs ieee international conference on computer systems and applications. pp. 72- ,(2005) , 10.1109/AICCSA.2005.1387066
P. Gogoi, D. K. Bhattacharyya, B. Borah, J. K. Kalita, A Survey of Outlier Detection Methods in Network Anomaly Identification The Computer Journal. ,vol. 54, pp. 570- 588 ,(2011) , 10.1093/COMJNL/BXR026
Yu Li, Rui Dai, Junjie Zhang, Morphing communications of Cyber-Physical Systems towards moving-target defense international conference on communications. pp. 592- 598 ,(2014) , 10.1109/ICC.2014.6883383