참고문헌
- S. Mohiuddin, S. Hershkop, R. Bhan and Stolfo, "Defending against a large scale denial-of-service attack", In Proceedings of IEEE Workshop on Information Assurance and Security, US. Military Academy, NY, pp.1555-1562, Jun. 2002
- L. Lersak and R. Amon, "Distributed denial of service detection using TCP/IP header and traffic measurement analysis", Inter. symposium on communications and information technologies 2004, Vol. 1, pp. 605-610, Oct. 2004 https://doi.org/10.1109/ISCIT.2004.1412917
- S. Augustion, S. Kave, and T. Nina, "Combining filtering and statistical methods for anomaly detection", Internet measurement conference 2005, pp.331 -244, 2005
- Y. Xiang and W. Zhou, "Trace IP packets by flexible deterministic packet marking (FDPM)", Proceedings IEEE Workshop on IP Operations and Management, pp. 246-252, Oct. 2004 https://doi.org/10.1109/IPOM.2004.1547624
- C. Gong and K. Sarac, "A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking", IEEE Transactions on Parallel and Distributed Systems, vol. 19, pp. 1310-1324, Oct. 2008 https://doi.org/10.1109/TPDS.2007.70817
- T. Dubendorfer, M. Bossardt, and B. Plattner, "Adaptive distributed traffic control service for DDoS attack mitigation", proceedings of the 19th IEEE inter. parallel and distributed processing symposium, April, 2005 https://doi.org/10.1109/IPDPS.2005.76
- S. H. Lee et aI., "Abnormal traffic detection and its implementation", The 7th International Conference on Advanced Communication Technology, vol. 1, pp. 246-250, 2005 https://doi.org/10.1109/ICACT.2005.245837
- G. Box, G. Jenkins, and G. Reinsel, Time series analysis, 3rd edition, Prentice Hall, 1994
- A. Bremler-Barr, and H. Levy, "Spoofing prevention method", Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 536-547, March 2005 https://doi.org/10.1109/INFCOM.2005.1497921
- S. J. Templeton, and K. E. Levitt, "Detecting spoofed packets", DARPA Information Survivability Conference and Exposition, vol. 1, pp.164-175, ApriI 2003
- T. Baba, and S. Matsuda, 'Tracing network attacks to their sources', Internet Computing, IEEE, vol. 6, pp. 20-26, March-April 2002 https://doi.org/10.1109/4236.991439
- Wikipedia, free encyclopedia, [Online]. Available: http://en.wikipedia.org/wiki/Standard_deviation