Results
Found 66 publication records. Showing 66 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
110 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
99 | Jun Zheng, Ming-Zeng Hu |
Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
90 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
84 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
64 | Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre |
An active security protocol against DoS attacks. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
Network Security, Denial of Service, Signaling protocols |
61 | Hong-bin Yim, Jae-Il Jung |
IP Traceback Algorithm for DoS/DDoS Attack. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Yongjin Kim, Ahmed Helmy |
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. |
MobiQuitous |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Early DoS/DDoS Detection Method using Short-term Statistics. |
CISIS |
2010 |
DBLP DOI BibTeX RDF |
DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method |
56 | Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi |
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
DoS/DDos, Detection Scheme, Chi-square Method, Destination Port Number |
51 | Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao |
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
DoS/DDoS, WSN, Traceback, PPM, Convergence time |
51 | Jun-Sang Park, Myung-Sup Kim |
Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
Traffic Flooding Attack, DoS/DDoS, Detection Time, Detection System, SNMP, MIB, Detection Algorithm |
51 | Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin |
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
NIDS (Network Intrusion Detection System), DoS/DDoS Attacks, KNN (k-Nearest Neighbor), Genetic Algorithm, Network Security |
49 | Yong Cui 0001, Lingjian Song, Ke Xu 0002 |
RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
46 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IPMultimedia subsystem. |
GECCO (Companion) |
2008 |
DBLP DOI BibTeX RDF |
network security, artificial immune systems, ip multimedia subsystem |
46 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IP multimedia subsystem. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
network, artificial immune systems, IP multimedia subsystem |
43 | Song Huang, Ling Zhang 0005, Shouling Dong |
A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Fang-Yie Leu, Chia-Chi Pai |
Detecting DoS and DDoS Attacks Using Chi-Square. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Tong Liu, Chwan-Hwa John Wu |
Intrusion-resilient, DDoS-resistant and agent-assisted network security system. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang |
A Performance-Based Grid Intrusion Detection System. |
COMPSAC (1) |
2005 |
DBLP DOI BibTeX RDF |
PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA |
38 | Kihong Park, Heejo Lee |
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. |
SIGCOMM |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Gitae Kim, Tony J. Bogovic, Dana Chee |
ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring |
32 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach |
29 | Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang |
Unified Defense Against DDoS Attacks. |
Networking |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour |
A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo |
An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. |
ICN (1) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu |
On the Issues of IP Traceback for IPv6 and Mobile IPv6. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Xuan-Ha Nguyen, Kim-Hung Le |
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model. |
Internet Things |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang |
DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. |
Comput. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Peyman Khordadpour, Saeed Ahmadi |
FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Farouq Aliyu, Tarek R. Sheltami, Marwan H. Abu-Amara, Mohamed Deriche 0001, Ashraf S. Mahmoud |
Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks. |
ACR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai |
Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset. |
ICISSP |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Hikofumi Suzuki, Akiyoshi Iwasa, Takumi Uchiyama, Katsumi Wasaki |
Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram Generation. |
NaNA |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Bushra Alhijawi, Sufyan Almajali, Hany Elgala, Haythem Bany Salameh, Moussa Ayyash |
A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. |
Comput. Electr. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, Raouf Boutaba |
SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices. |
FNWF |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu |
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. |
MobiSec |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Jorge Steven Martinez Osorio, Jaime Alberto Vergara Tejada, Juan Felipe Botero |
Detection of DoS/DDoS attacks: the UBM and GMM approach. |
IM |
2021 |
DBLP BibTeX RDF |
|
24 | Giorgi Iashvili, Maksim Iavich, Razvan Bocu, Roman Odarchenko, Sergiy Gnatyuk |
Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks. |
IDAACS |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Leonid Galchynsky, Mykola Graivoronskyi, Oleh O. Dmytrenko |
Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT. |
ITS |
2021 |
DBLP BibTeX RDF |
|
24 | Jia Chen, Haiyu Jia, Qi Liu 0003 |
Dual-collaborative DoS/DDoS mitigation approach in information-centric mobile Internet. |
Int. J. Commun. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Liming Fang 0001, Bo Zhao, Yang Li 0103, Zhe Liu 0001, Chunpeng Ge, Weizhi Meng 0001 |
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances. |
IEEE Netw. |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Francisco Sales de Lima Filho, Frederico Augusto Fernandes Silveira, Agostinho de Medeiros Brito Júnior, Genoveva Vargas-Solar, Luiz Felipe Q. Silveira |
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning. |
Secur. Commun. Networks |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Rajendra Patil, Harsha Dudeja, Snehal Gawade, Chirag Modi 0001 |
Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud. |
ICCCNT |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Osman Ali, Paul Cotae |
Towards DoS/DDoS Attack Detection Using Artificial Neural Networks. |
UEMCON |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Marcos V. O. de Assis, Anderson H. Hamamoto, Taufik Abrão, Mario Lemes Proença Jr. |
A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks. |
IEEE Access |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Yanghong Zhou |
Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance. |
HPCC/CSS/ICESS |
2015 |
DBLP DOI BibTeX RDF |
|
24 | |
Radware Lagebericht: DoS-/DDoS-Attacken unter den aktuell größten Gefahren für die IT-Sicherheit. |
Datenschutz und Datensicherheit |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Mohammed A. Saleh, Azizah Abdul Manaf |
Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review. |
AMLTA |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Alex Doyal, Justin Zhan |
Triple DoS: DDoS defence and traceback. |
Int. J. Inf. Priv. Secur. Integr. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Daeyoub Kim, Jihoon Lee |
How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack. |
IEICE Trans. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Theodoros Spyridopoulos, G. Karanikas, Theodore Tryfonas, Georgios Oikonomou |
A game theoretic defence framework against DoS/DDoS cyber attacks. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Uliana Yatsykovska, Mykola Karpinski, Ihor Vasyltsov, Pavlo Bykovyy |
The monitoring system of DoS/DDoS attacks in the global network. |
IDAACS (2) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | PyungKoo Park, HeeKyoung Yi, Sangjin Hong, Jaecheol Ryou 0001 |
An effective defense mechanism against DoS/DDoS attacks in flow-based routers. |
MoMM |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Ping Du, Shunji Abe |
IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks. |
IEICE Trans. Inf. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Takanori Komatsu, Akira Namatame |
On the Effectiveness of Rate-Limiting Methods to Mitigate Distributed DoS (DDoS) Attacks. |
IEICE Trans. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jin Shu, Fengyu Liu, Manwu Xu |
Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. |
Security and Management |
2005 |
DBLP BibTeX RDF |
|
24 | Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman |
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme. |
SEC |
2005 |
DBLP BibTeX RDF |
|
19 | Jun Bi, Ping Hu, Lizhong Xie |
Shim6: Reference Implementation and Optimization. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
IPv6, Multihoming, Shim6 |
19 | Yan Shen, Jun Bi, Jianping Wu, Qiang Liu |
The Automatic Peer-to-Peer Signature for Source Address Validation. |
KES (1) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Spoofing Prevention, Key Management |
19 | Yang Li 0002, Binxing Fang |
A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Muthusrinivasan Muthuprasanna, G. Manimaran, Mansoor Alicherry, Vijay Kumar |
Coloring the Internet: IP Traceback. |
ICPADS (1) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Hai-Tao He, Xiao-Nan Luo, Bao-Lu Liu |
Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches. |
ICIC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Fu-Hau Hsu, Tzi-cker Chiueh |
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma |
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #66 of 66 (100 per page; Change: )
|