1 |
严芬, 王佳佳, 赵金凤 等. DDoS攻击检测综述. 计算机应用研究, 2008,25(4): 966~969
|
2 |
Farahmand M , Azarfar A , Jafari A , et al. A multivariate adaptive method for detecting ARP anomaly in local area networks.In: Tahiti, Oct 2009
|
3 |
张洁, 武装, 陆倜 . 一种改进的ARP协议欺骗检测方法. 计算机科学, 2008,35(3): 52~54
|
4 |
孙知信, 任志广, 杨熙 等. 基于多层检测的网络安全防范系统. 通信学报, 2007,28(7): 61~69
|
5 |
Yann Labit , Johan Mazel . HIDDEN:hausdorff distance based intrusion detection approach dedicated to networks.In: Proc of ICIMP’08, Bucharest, July 2008
|
6 |
HyunGon Kim . Protection against packet fragmentation attacks at 6LoWPAN adaptation layer.In: Proc of ICHIT’08, Daejeon, Aug 2008
|
7 |
Udhayan J , Anitha R . Demystifying and rate limiting ICMP hosted DoS/DDoS flooding attacks with attack productivity analysis.In: Proc of IACC 2009, Patiala, March 2009
|
8 |
胡鸿, 袁津生, 郭敏哲 . 基于TCP缓存的DDoS攻击检测算法. 计算机工程, 2009,35(16): 112~114
|
9 |
Chen Ning , Chen Xiaosu , Xiong Bing , et al. An anomaly detection and analysis method for network traffic based on correlation coefficient matrix.In: Proc of SCALCOMEMBEDDEDCOM’09, Dalian Sept 2009
|
10 |
Xu Rui , Ma Wenli , Zheng Wenling . Defending against UDP flooding by negative selection algorithm based on eigenvalue sets.In: Proc of IAS’09, Xiˊan Aug 2009
|
11 |
Michael Walfish , Mythili Vutuku , Hari BaIabshnan , et al. DDoS defense by offense.In: Proc of SIGCOMM ˊ06, Pisa,Italy, Sept 2006
|
12 |
Supranamaya Ranjan , Ram Swaminathan , Mustafa Uysal , et al. DDoS-shield:DDOS-resilient scheduling to counter application laye attacks. IEEE/ACM Transactions on Networking, 2009,17(1): 26~39
|
13 |
Georgios Oikonomou , Jelena Mirkovic . Modeling human behavior for defense against flash-crowd attacks.In: Proc of ICC’09, Dresden June 2009
|
14 |
Yi Xie , Shun Zhengyu . Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM transaction on networking, 2009,17(1): 15~25
|
15 |
康健, 李强, 张原 . 基于Multi-stream Combined隐马尔柯夫模型源端检测DDoS攻击. 计算机应用, 2007,27(8): 1884~1887
|
16 |
陈伟, 何炎祥, 彭文灵 . 一种轻量级的拒绝服务攻击检测方法. 计算机学报, 2006,29(8): 1392~1400
|
17 |
Malliga S , Tamilarasi A , Janani M . Filtering spoofed traffic at source end for defending against DoS/DDoS attacks.In: Proc of ICCCn 2008, St Thomas,VI, Dec 2008
|
18 |
Jelena Mirkovic , PeterReiher . D-Ward:a source-end defense against flooding denial-of-service attacks. IEEE Transactions on Dependable and Secure Computing, 2005,2(3): 216~232
|
19 |
Meenakshi S , Srivatsa SK . A distributed framework with less false positive ratio against distributed denial of service attack. Information Technology Journal, 2007,6(8): 1139~1145
|
20 |
Bu Kai , Sun Zhixin . A method based on AMHI for DDoS attacks detection and defense.In: Proc of ICYCS 2008, Hunan Nov 2008
|
21 |
严芬, 陈轶群, 黄皓, 等. 使用补偿非参数CUSUM方法检测DDoS攻击. 通信学报, 2008,29(6): 126~132
|
22 |
Bin Xiaoa , Wei Chen , Yanxiang He . An autonomous defense against SYN flooding attacks:detect and throttle attacks at the victim side independently. Journal of Parallel and Distributed Computing, 2008(68): 456~470
|
23 |
Cheng Jieren , Yin Jianping , Liu Yun , et al. DDoS attack detection using IP address feature interaction.In: Proc of INCOS’ 09, Nov 2009
|
24 |
Wang Haining , Jin Cheng , Shin K G . Defense against spoofed IP traffic using hop -count filtering. IEEE/ACM Transactions on Networking, 2007,15(1): 40~53
|
25 |
周再红, 谢冬青, 熊伟 等. 一种基于带权CAT的DDOS分布式检测方法. 武汉大学学报(理学版), 2008,54(5): 626~630
|
26 |
田俊峰, 朱宏涛, 孙冬冬 等. 基于用户信誉值防御DDoS攻击的协同模型. 通信学报, 2009,30(3): 12~20
|