Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
A signal analysis of network traffic anomalies
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Detecting Denial-of-Service attacks using the wavelet transform
Computer Communications
Collaborative Detection of DDoS Attacks over Multiple Network Domains
IEEE Transactions on Parallel and Distributed Systems
Distributed change-point detection of DDoS attacks: experimental results on DETER testbed
DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
Denial of service detection and analysis using idiotypic networks paradigm
Proceedings of the 10th annual conference on Genetic and evolutionary computation
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
DDoS attacks detection model and its application
WSEAS Transactions on Computers
A method of run-time detecting DDos attacks
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Towards lightweight and efficient DDOS attacks detection for web server
Proceedings of the 18th international conference on World wide web
A prediction-based detection algorithm against distributed denial-of-service attacks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Effective DDoS Attacks Detection Using Generalized Entropy Metric
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
International Journal of Information and Computer Security
A detection model based on statistical against DDoS attack
Proceedings of the 2009 International Conference on Hybrid Information Technology
Chaos theory based detection against network mimicking DDoS attacks
IEEE Communications Letters
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers
Information Security Applications
Anomaly-based identification of large-scale attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Temporally oblivious anomaly detection on large networks using functional peers
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Expert Systems with Applications: An International Journal
Automatic control method of DDoS defense policy through the monitoring of system resource
AICT'11 Proceedings of the 2nd international conference on Applied informatics and computing theory
Launching distributed denial of service attacks by network protocol exploitation
AICT'11 Proceedings of the 2nd international conference on Applied informatics and computing theory
Collaborative anomaly-based detection of large-scale internet attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improved anomaly detection using block-matching denoising
Computer Communications
Detecting DNS amplification attacks
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
DDoS defense mechanisms: a new taxonomy
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Review: Analyzing well-known countermeasures against distributed denial of service attacks
Computer Communications
DDoS flooding attack detection scheme based on F-divergence
Computer Communications
Distributed denial-of-service attack detection scheme-based joint-entropy
Security and Communication Networks
Chaos-based detection of LDoS attacks
Journal of Systems and Software
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
Endpoint mitigation of DDoS attacks based on dynamic thresholding
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Denial-of-service (DoS) detection techniques--such as activity profiling, changepoint detection, and wavelet-based signal analysis--face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques and testing results provides insight into our ability to successfully identify DoS flooding attacks. Although each detector shows promise in limited testing, none completely solve the detection problem.Combining various approaches with experienced network operators will most likely produce the best results.