Http-flood DDoS detection scheme based on large deviation and performance analysis

被引:4
|
作者
机构
[1] [1,Wang, Jin
[2] 1,Yang, Xiao-Long
[3] 1,Long, Ke-Ping
来源
Yang, X.-L. (yxl@uestc.edu.cn) | 1600年 / Chinese Academy of Sciences卷 / 23期
关键词
Floods;
D O I
10.3724/SP.J.1001.2012.04068
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection
    K. Munivara Prasad
    A. Rama Mohan Reddy
    K. Venugopal Rao
    [J]. Wireless Personal Communications, 2017, 97 : 281 - 308
  • [2] BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection
    Prasad, K. Munivara
    Reddy, A. Rama Mohan
    Rao, K. Venugopal
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) : 281 - 308
  • [3] HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle
    Wang Jin
    Yang XiaoLong
    Zhang Min
    Long KePing
    Xu Jie
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (10) : 1 - 15
  • [4] HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle
    Jin Wang
    XiaoLong Yang
    Min Zhang
    KePing Long
    Jie Xu
    [J]. Science China Information Sciences, 2014, 57 : 1 - 15
  • [5] HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle
    WANG Jin
    YANG XiaoLong
    ZHANG Min
    LONG KePing
    XU Jie
    [J]. Science China(Information Sciences), 2014, 57 (10) : 5 - 19
  • [6] TCP and HTTP Flood DDOS Attack Analysis and Detection for space ground Network
    Shaaban, Eng Ahmed Ramzy
    Abdelwaness, Essam
    Hussein, Mohamed
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE OF VEHICULAR ELECTRONICS AND SAFETY (ICVES 19), 2019,
  • [7] 基于大偏差统计模型的Http-Flood DDoS检测机制及性能分析
    王进
    阳小龙
    隆克平
    [J]. 软件学报, 2012, 23 (05) : 1272 - 1280
  • [8] HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks
    Beckett, David
    Sezer, Sakir
    [J]. 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 107 - 112
  • [9] Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation
    Wang, Jin
    Yang, Xiaolong
    Long, Keping
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [10] DDoS Flood Attack Detection Based On Fractal Parameters
    Xia, Zhengmin
    Lu, Songnian
    Li, Jianhua
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,