Entropy Variation Based Detecting DDoS Attack in Large Scale Networks
Abstract
Keywords
Full Text:
PDFReferences
Shui Yu, Member, IEEE, Wanlei Zhou, Senior Member, IEEE, Robin Doss, Member, IEEE, and Weijia Jia, Senior Member, IEEE (MARCH 2011) , IEEE Transactions On Parallel And Distributed Systems, VOL. 22, NO. 3.
―Lincoln Laboratory Scenario (DDoS) 1.0,‖(2010), MIT, http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/ data/2000/LLS_DDOS_1.0.html.
―Accurately Measuring Denial of Service in Simulation and Testbed Experiments,‖( Apr.-June 2009.)J. Mirkovic et al., IEEE Trans. Dependable and Secure Computing, vol. 6, no. 2, pp.81-95.
J. Mirkovic et al., ―Testing a Collabotative DDoS Defense in a Red/Blue Team Exercise,‖( Aug. 2008) IEEE Trans. Computers, vol. 57, no. 8, pp. 1098-1112.
―Survey of Network- Based Defense Mechanisms Countering the DoS and DDoS Problems,‖ (2007.) T. Peng, C. Leckie, and K. Ramamohanarao, ACM Computing Surveys, vol.39, no.1,p.3.
―Inferring Internet Denial-of-Service Activity,‖( May 2006.) D. Moore et al.ACM Trans. Computer Systems, vol. 24, no. 2, pp. 115-139.
―Credit Card Fraud Detection Using Hidden Markov Model,‖ (January-March 2008)Abhinav Srivastava, Amlan Kundu, Shamik Sural, Senior Member, IEEE, and Arun K. Majumdar, Senior Member, IEEE. IEEE transactions on dependable and secure computing, vol. 5, no. 1.
―Robustness of the Markov-Chain Model for Cyber-Attack Detection,‖( March 2004) Nong Ye, Senior Member, IEEE, Yebin Zhang, and Connie M. Borror, IEEE transactions on reliability, vol. 53, no. 1.
―Markov Chains, Classifiers, and Intrusion Detection,‖ S. Jha_ K. Tany R.A. Maxiony
―About Some Applications of Hidden Markov Model in Intrusion Detection Systems,‖ Veselina Jecheva, International Conference on Computer Systems and Technologies - CompSysTech’06.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.