Journal of Engineering and Applied Sciences

Year: 2014
Volume: 9
Issue: 10
Page No. 368 - 371

Architecture and Program Realization of System of Detection of Network Attacks to Denial of Service

Authors : Shangytbayeva Gulmira and Karpinski Mikolaj

References

Apiecionek, L., J.M. Czerniak and W.T. Dobrosielski, 2015. Quality of services method as a DDoS protection tool. Adv. Intell. Syst. Comput., 323: 225-234.
CrossRef  |  Direct Link  |  

Bhatia, S., D. Schmidt, G. Mohay and A. Tickle, 2014. A framework for generating realistic traffic for distributed denial-of-service attacks and flash events. Comput. Security, 40: 95-107.
CrossRef  |  Direct Link  |  

Bhuyan, M.H., D.K. Bhattacharyya and J.K. Kalita, 2015. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recognit. Lett., 51: 1-7.
CrossRef  |  Direct Link  |  

Bu, T., S. Norden and T. Woo, 2004. Trading resiliency for security: Model and algorithms. Proceedings of the 12th IEEE International Conference on Network Protocols, October 5-8, 2004, IEEE Computer Society, Washington DC. USA., pp: 218-227.

Dean D., M. Franklin and A. Stubblefield, 2001. An algebraic approach to IP traceback. Proceedings of the Network and Distributed System Security Symposium, February 8-9, 2001, Sand Diego, CA., USA., pp: 3-12.

Elliott, J., 2000. Distributed denial of service attacks and the zombie ant effect. IT Professional, 2: 55-57.
CrossRef  |  Direct Link  |  

Garber, L., 2000. Denial-of-service attacks rip the internet. Computer, 33: 12-17.
CrossRef  |  Direct Link  |  

Hautio, J. and T. Weckstrom, 1999. Denial of service attacks. March 1999. http://www.hut.fi/u/tweckstr/hakkeri/DoS_paper.html.

Hussain, A., J. Heidemann and C. Papadopoulos, 2003. A framework for classifying denial of service attacks. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, August 25-29, 2003, Karlsruhe, Germany, pp: 99-110.

Ioannidis, J. and S.M. Bellovin, 2002. Implementing pushback: Router-based defense against DDoS attacks. Proceedings of the 9th Symposium Network and Distributed System Security, February 6-8, 2002, San Diego, California, USA., pp: 1-12.

Li, M., M. Li and X. Jiang, 2008. DDoS attacks detection model and its application. WSEAS Trans. Comput., 7: 1159-1168.
Direct Link  |  

Ozcelik, I. and R.R. Brooks, 2015. Deceiving entropy based DoS detection. Comput. Security, 48: 234-245.
CrossRef  |  Direct Link  |  

Szczerba, E.V. and D.A. Volkov, 2013. Development of the system architecture of distributed detection of network attacks such as denial of service. Magazine Applied Discrete Mathematics Application, Issue No. 6, pp: 68-70.

Szczerba, E.V. and M.V. Szczerba, 2012. Development of the system architecture of distributed detection of network attacks such as denial of service. Scientific Herald of Omsk. Ser. Appliances Machinery Technology, 113: 280-283.

Wang, J. and A.A. Chien, 2003. Using overlay networks to resist denial of service attacks. Proceedings of the ACM Conference on Computer and Communucation Security, October 2003, Washington DC., USA., pp: 1-13.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved