1 |
S. Augustion, S. Kave, and T. Nina, "Combining filtering and statistical methods for anomaly detection", Internet measurement conference 2005, pp.331 -244, 2005
|
2 |
S. H. Lee et aI., "Abnormal traffic detection and its implementation", The 7th International Conference on Advanced Communication Technology, vol. 1, pp. 246-250, 2005
DOI
|
3 |
S. Mohiuddin, S. Hershkop, R. Bhan and Stolfo, "Defending against a large scale denial-of-service attack", In Proceedings of IEEE Workshop on Information Assurance and Security, US. Military Academy, NY, pp.1555-1562, Jun. 2002
|
4 |
A. Bremler-Barr, and H. Levy, "Spoofing prevention method", Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 536-547, March 2005
DOI
|
5 |
G. Box, G. Jenkins, and G. Reinsel, Time series analysis, 3rd edition, Prentice Hall, 1994
|
6 |
Wikipedia, free encyclopedia, [Online]. Available: http://en.wikipedia.org/wiki/Standard_deviation
|
7 |
C. Gong and K. Sarac, "A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking", IEEE Transactions on Parallel and Distributed Systems, vol. 19, pp. 1310-1324, Oct. 2008
DOI
ScienceOn
|
8 |
Y. Xiang and W. Zhou, "Trace IP packets by flexible deterministic packet marking (FDPM)", Proceedings IEEE Workshop on IP Operations and Management, pp. 246-252, Oct. 2004
DOI
|
9 |
T. Dubendorfer, M. Bossardt, and B. Plattner, "Adaptive distributed traffic control service for DDoS attack mitigation", proceedings of the 19th IEEE inter. parallel and distributed processing symposium, April, 2005
DOI
|
10 |
S. J. Templeton, and K. E. Levitt, "Detecting spoofed packets", DARPA Information Survivability Conference and Exposition, vol. 1, pp.164-175, ApriI 2003
|
11 |
L. Lersak and R. Amon, "Distributed denial of service detection using TCP/IP header and traffic measurement analysis", Inter. symposium on communications and information technologies 2004, Vol. 1, pp. 605-610, Oct. 2004
DOI
|
12 |
T. Baba, and S. Matsuda, 'Tracing network attacks to their sources', Internet Computing, IEEE, vol. 6, pp. 20-26, March-April 2002
DOI
ScienceOn
|