References
- Anderson, T. W. (1962). On the distribution of the two-sample Cramer-Von-Mises criterion, Annals of Mathematical Statistics, 33, 1148-1159. https://doi.org/10.1214/aoms/1177704477
- Basseville, M. and Nikoforov, I. V. (1993). Detection of Abrupt Change Theory and Application, Prentice Hall, Englewood Clifs, NJ.
- Brodsky, B. E. and Darkhovsky, B. S. (1993). Nonparametric Methods in Change-point Problems, Kluwer Academic Publishers.
- Carl, G., Kesidis, G., Brooks, R. R. and Suresh, R. (2006). Denial-of-service attack-detection techniques, IEEE Internet Computing, 10, 82-89.
- Gibbons, J. D. and Chakraborti, S. (2003). Nonparametric Statistical Inference, 4th Edition, The university of Alabama.
- Gordon, L. and Pollak, M. (1994). An efficient sequential nonparametric scheme for detecting a change in distribution, Annuls of Statistics, 22, 763-804. https://doi.org/10.1214/aos/1176325495
- Greenwell, R. N. and Finch, S. J. (2004). Randomized rejection procedure for the two-sample Kolmogorov- Smirnov statistic, Computational Statistics and Data Analysis, 46, 257-267. https://doi.org/10.1016/S0167-9473(03)00148-8
- Karen, S. and Peter, M. (2007). Guide to Intrusion Detection and Prevention Systems(IDPS), Recommendations of the National Institute of Standards and Technology.
- Kim, P. K. (1969). On the exact and approximate sampling distribution of the two sample Kolmogorov Smirnov Criterion, Journal of the American Statistical Association, 64, 1625-1637.
- Lepage, Y. (1971). A combination of Wilcoxon's and Ansari-Bradley's statistics, Biometrika, 58, 213-217. https://doi.org/10.1093/biomet/58.1.213
- Li, L. and Lee, G. H. (2003). DDoS attack detection and wavelets, Computer Communications and Networks, Proceedings, 12, 421-427.
- McDonald, D. (1990). A Cusum procedure based on sequential ranks, Naval Research Logistics, 37, 627-646. https://doi.org/10.1002/1520-6750(199010)37:5<627::AID-NAV3220370504>3.0.CO;2-F
- Ming, Y. (2011). A nonparametric adaptive CUSUM method and its application in source-end defense against SYN flooding attacks, Wuhan University Journal of Natural Sciences, 16, 414-418. https://doi.org/10.1007/s11859-011-0772-5
- Ross, G. J. and Adams, N. M. (2012). Two nonparametric control charts for detecting arbitrary distribution changes, Journal of Quality Technology, 44, 102-116. https://doi.org/10.1080/00224065.2012.11917887
- Ross, G. J., Dimitris, K. and Adams, N. M. (2011). Nonparametric monitoring of data streams for changes in location and scale, Technometrics, 53, 379-389. https://doi.org/10.1198/TECH.2011.10069
- Siris, V. A. and Papagalou, F. (2006). Application of anomaly detection algorithms for detecting SYN flooding attacks, Computer Communications, 29, 1433-1442. https://doi.org/10.1016/j.comcom.2005.09.008
- Symantec, Inc. (2011). Norton Cyber Crime Report 2011.
- Takada, H. H. and Hofmann, U. (2004). Application and analyses of cumulative sum to detect highly distributed denial of service attacks using different attack traffic patterns, IST INTERMON Newsletter, 7, 1-14.
- Tartakovsky, A. G., Rozovskii, B. L. and Blazek, R. B. (2006). A novel approach to detection of denial-ofservice attacks via adaptive sequential and batch sequential change-point detection methods, IEEE Transactions on Signal Processing, 54, 3372-3382. https://doi.org/10.1109/TSP.2006.879308
- Wang, H., Zhang, D. and Shin, K. G. (2004). Change-point monitoring for detection of DoS attacks, IEEE Transactions on Dependable and Secure Computing, 1, 193-208. https://doi.org/10.1109/TDSC.2004.34
Cited by
- The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform vol.2016, 2016, https://doi.org/10.1155/2016/2946735