Distributed denial-of-service and intrusion detection

被引:1
|
作者
Zhou, Xiaobo
Xu, Cheng-Zhong
机构
[1] Univ Colorado, Dept Comp Sci, Colorado Springs, CO 80933 USA
[2] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
关键词
D O I
10.1016/j.jnca.2005.07.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:819 / 822
页数:4
相关论文
共 50 条
  • [21] Wavelet based denial-of-service detection
    Carl, Glenn
    Brooks, Richard R.
    Rai, Suresh
    [J]. COMPUTERS & SECURITY, 2006, 25 (08) : 600 - 615
  • [22] Denial-of-Service Attack Detection System
    Thakare, Supriya S.
    Kaur, Parminder
    [J]. 2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 281 - 285
  • [23] Decision analysis of network-based intrusion detection systems for denial-of-service attacks
    Li, M
    Jia, WJ
    Zhao, W
    [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E1 - E6
  • [24] A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method
    Bojovic, P. D.
    Basicevic, I.
    Ocovaj, S.
    Popovic, M.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 84 - 96
  • [25] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [26] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [27] Towards Stabilization of Distributed Systems under Denial-of-Service
    Feng, Shuai
    Tesi, Pietro
    De Persis, Claudio
    [J]. 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [28] A BitTorrent-driven distributed denial-of-service attack
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 261 - 268
  • [29] Gradient Techniques to Predict Distributed Denial-Of-Service Attack
    Qamar R.
    [J]. Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 55 - 71
  • [30] Harnessing the power of BitTorrent for distributed denial-of-service attacks
    Wu, Lei
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 860 - 870