![]() Sanguk, N., Gihyun, J., Kyunghee, C., et al.: Compiling network traffic into rules using soft computing methods for the detection of flooding attacks. Rep: Schectades, New York (2001)ĭongqing, Z., Haifeng, Z., Shaowu, Z., et al.: A DDoS Attack Detection Method Based on Hidden Markov Model. Kulkarni, A., Bush, S., Evans, S.: Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics. In: Proceedings of ACM SIGCOMM, Portland, Oregon, USA (August 2004) Lakhina, A., Crovella, M., Diot, C.: Diagnosing Network-Wide Traffic Anomalies. Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: A statistical anomaly approach. In: Proceedings of IEEE GLOBECOM 2002, pp. ![]() (2005), Ĭheng, C.M., Kung, H.T., Tan, K.S.: Use of spectral analysis in defense against DoS attacks. Handley, M.: DoS-resistant Internet subgroup report. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |