1 |
Ranjan S , Swaminathan R , Uysal M , et al. DDoS-resilient scheduling to counter application layer attacks under imperfect detection. IEEE-ACM Transaction on Networking, 2009, 17(1):26~39
|
2 |
Arbor Networks. World wide infrastructure security report, volume V. , 2009
|
3 |
Zhao Guofeng , Yu Shoucheng , Wen Sheng . Detecting application-layer DDoS attack based on analysis of usersˊbehaviors. Application Research of Computers, 2011, 28(2):717~719
|
4 |
Sangjae Lee , Gisung Kim , Sehun Kim . Sequence-order-independent network profiling for detecting application layer DDoS attacks. EURASIP Journal on Wireless Communications and Networking, 2011: 50~58
|
5 |
Ankali S B , Ashoka D V . Detection architecture of application layer DDoS attack for internet. International Journal of Advanced Networking and Applications, 2011, 3(1):984~990
|
6 |
Khattab S , Gobriel S , Melhem R , et al. Live baiting for service-level DoS attackers. Proceedings of 27th IEEE Communications Society Conference on Computer Communications, 2008: 682~690
|
7 |
孙长华, 刘斌 . 分布式拒绝服务攻击研究新进展综述. 电子学报, 2009,37(7):1562~1570
|
8 |
Yu J , Li Z , Chen H , et al. A detection and offense mechanism to defend against application layer DDoS attacks. Proceedings of 3rd International Conference on Networking and Services, 2007
|
9 |
Srivatsa M , Iyengar A , Yin J , et al. Mitigating application-level denial of service attacks on web servers: a client-transparent approach. ACM Transactions on the Web, 2008, 2(3):1~49
|
10 |
Xie Y , Yu S . Monitoring the application-layer DDoS attacks for popular Websites. IEEE/ACM Transactions on Networking, 2009, 17(1):15~25
|
11 |
Xie Y , Yu S . A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking, 2009, 17(1):54~65
|
12 |
Kandula S , Katabi D , Jacob M , et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds. Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation, 2005:287~300
|
13 |
Mori G , Malik J . Recognizing objects in adversarial clutter:breaking a visual CAPTCHA. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003(1):134~144
|
14 |
Broder A , Mitzenmacher M . Network applications of bloom filters: a survey. Internet Mathematic, 2002,1(4):485~509
|
15 |
The network simulator-ns-2. , 2011
|
16 |
Cao J , Cleveland W , Cao Y , et al. Stochastic models for generating synthetic http source traffic. Proceedings of IEEE INFOCOM, 2004:1546~1557
|