Journal of Engineering and Applied Sciences
Year:
2014
Volume:
9
Issue:
10
Page No.
368 - 371
References
Apiecionek, L., J.M. Czerniak and W.T. Dobrosielski, 2015. Quality of services method as a DDoS protection tool. Adv. Intell. Syst. Comput., 323: 225-234.
CrossRef | Direct Link | Bhatia, S., D. Schmidt, G. Mohay and A. Tickle, 2014. A framework for generating realistic traffic for distributed denial-of-service attacks and flash events. Comput. Security, 40: 95-107.
CrossRef | Direct Link | Bhuyan, M.H., D.K. Bhattacharyya and J.K. Kalita, 2015. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recognit. Lett., 51: 1-7.
CrossRef | Direct Link | Bu, T., S. Norden and T. Woo, 2004. Trading resiliency for security: Model and algorithms. Proceedings of the 12th IEEE International Conference on Network Protocols, October 5-8, 2004, IEEE Computer Society, Washington DC. USA., pp: 218-227.
Dean D., M. Franklin and A. Stubblefield, 2001. An algebraic approach to IP traceback. Proceedings of the Network and Distributed System Security Symposium, February 8-9, 2001, Sand Diego, CA., USA., pp: 3-12.
Elliott, J., 2000. Distributed denial of service attacks and the zombie ant effect. IT Professional, 2: 55-57.
CrossRef | Direct Link | Garber, L., 2000. Denial-of-service attacks rip the internet. Computer, 33: 12-17.
CrossRef | Direct Link | Hautio, J. and T. Weckstrom, 1999. Denial of service attacks. March 1999. http://www.hut.fi/u/tweckstr/hakkeri/DoS_paper.html.
Hussain, A., J. Heidemann and C. Papadopoulos, 2003. A framework for classifying denial of service attacks. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, August 25-29, 2003, Karlsruhe, Germany, pp: 99-110.
Ioannidis, J. and S.M. Bellovin, 2002. Implementing pushback: Router-based defense against DDoS attacks. Proceedings of the 9th Symposium Network and Distributed System Security, February 6-8, 2002, San Diego, California, USA., pp: 1-12.
Li, M., M. Li and X. Jiang, 2008. DDoS attacks detection model and its application. WSEAS Trans. Comput., 7: 1159-1168.
Direct Link | Ozcelik, I. and R.R. Brooks, 2015. Deceiving entropy based DoS detection. Comput. Security, 48: 234-245.
CrossRef | Direct Link | Szczerba, E.V. and D.A. Volkov, 2013. Development of the system architecture of distributed detection of network attacks such as denial of service. Magazine Applied Discrete Mathematics Application, Issue No. 6, pp: 68-70.
Szczerba, E.V. and M.V. Szczerba, 2012. Development of the system architecture of distributed detection of network attacks such as denial of service. Scientific Herald of Omsk. Ser. Appliances Machinery Technology, 113: 280-283.
Wang, J. and A.A. Chien, 2003. Using overlay networks to resist denial of service attacks. Proceedings of the ACM Conference on Computer and Communucation Security, October 2003, Washington DC., USA., pp: 1-13.