References
- Y. Xie and S. Z. Yu, "Monitoring the Application-Layer DDoS Attacks for Popular Websites," IEEE/ACM Trans on Networking, vol 17, No. 1, pp. 15-25, Feb. 2009. https://doi.org/10.1109/TNET.2008.925628
- H.g Noh and N. Kang, "Efficient Buffer Management Scheme for Mitigating Possibility of DDoS Attack," The Journal of The Institute of Webcasting, Internet and Telecommunication, vol 12, no. 2, pp. 1-7, Apr. 2012.
- J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," in ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, Apr. 2004.
- J. B. D. Cabrear, L. Lewis, X. Qin, W. Lee, R. K. Prasanth, B. Ravichandran, and R. K. Mehra, "Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Varables - A Feasibility Study," in Proc. of the IEEE/IFIP International Symposium on Integrated Network Management, pp. 609-622, May 2001.
- J. Yuan and K. Mills, "Monitoring the Macroscopic Effect of DDoS Flooding Attacks," in IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 4, pp. 324-335, Oct.-Dec. 2005. https://doi.org/10.1109/TDSC.2005.50
- J. Mirkovic, G. Prier, and P. L. Reiher, "Attacking DDoS at the Source," in Proc. of the 10th IEEE International Conference on Network Protocols, pp. 312-321, nov. 2002.
- H. Wang, D. Zhang, K. G. Shin, "Detecting SYN Flooding Attacks", in Proc. of IEEE INFOCOM, vol. 3, pp. 1530-1539, Jun. 2002.
- S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning," in Lecture Notes in Computer Science, vol. 2690, pp. 286-295, 2003.
- S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection," in Proc. of IEEE INFOCOM, pp. 1-13, Apr. 2006.
- X. Kuai, Z. Zhi, and B. Supratik, "Profiling Internet Backbone Traffic Behavior Models and Applications," ACM SIGCOMM, vol.35, no.4, pp.169-180, Oct. 2005. https://doi.org/10.1145/1090191.1080112
- H, K. Kim and Y. Ky Chung, "Framework for Anomaly Traffic Detection and Queue Management Component," Journal of Advanced Information Technology and Convergence, vol.7, no.3, pp.156-170, Jun. 2009.
- K, K. Shin, U. C. Park, and M. S. Jun, "A Design of SMS DDoS Detection and Defense Method using Counting Bloom Filter," Proceedings of the KAIS Fall Conference, vol.1, pp.53-56, May. 2011.
- H. Noh and N. Kang, "Efficient Buffer Management Scheme for Mitigating Possibility of DDoS Attack," The International Journal of Internet, Broadcasting and Communication, vol.12, no.2, pp.1-7, Apr. 2012.
Cited by
- Key-pair(Public key, Private key) conflict analysis using OpenSSL vol.15, pp.8, 2014, https://doi.org/10.5762/KAIS.2014.15.8.5294