Results
Found 66 publication records. Showing 66 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack.  |
Int. J. Netw. Manag.  |
2005 |
DBLP DOI BibTeX RDF |
|
110 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks.  |
IWCMC  |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
99 | Jun Zheng, Ming-Zeng Hu |
Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services.  |
WAIM  |
2005 |
DBLP DOI BibTeX RDF |
|
90 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction.  |
IWSEC  |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks.  |
SASN  |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
84 | Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin |
Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy.  |
SpringSim (3)  |
2007 |
DBLP BibTeX RDF |
privacy, network security, DDoS, wireless security |
64 | Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre |
An active security protocol against DoS attacks.  |
ISCC  |
2002 |
DBLP DOI BibTeX RDF |
Network Security, Denial of Service, Signaling protocols |
61 | Hong-bin Yim, Jae-Il Jung |
IP Traceback Algorithm for DoS/DDoS Attack.  |
APNOMS  |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Yongjin Kim, Ahmed Helmy |
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks.  |
MobiQuitous  |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Early DoS/DDoS Detection Method using Short-term Statistics.  |
CISIS  |
2010 |
DBLP DOI BibTeX RDF |
DoS/DDoS attacks, Short-term entropy, A test of significance, IDS, Statistical Method |
56 | Shunsuke Oshima, Arata Hirakawa, Takuo Nakashima, Toshinori Sueyoshi |
DoS/DDoS Detection Scheme Using Statistical Method Based on the Destination Port Number.  |
IIH-MSP  |
2009 |
DBLP DOI BibTeX RDF |
DoS/DDos, Detection Scheme, Chi-square Method, Destination Port Number |
51 | Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao |
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN.  |
Inscrypt  |
2008 |
DBLP DOI BibTeX RDF |
DoS/DDoS, WSN, Traceback, PPM, Convergence time |
51 | Jun-Sang Park, Myung-Sup Kim |
Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System.  |
APNOMS  |
2008 |
DBLP DOI BibTeX RDF |
Traffic Flooding Attack, DoS/DDoS, Detection Time, Detection System, SNMP, MIB, Detection Algorithm |
51 | Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin |
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN.  |
ISI Workshops  |
2008 |
DBLP DOI BibTeX RDF |
NIDS (Network Intrusion Detection System), DoS/DDoS Attacks, KNN (k-Nearest Neighbor), Genetic Algorithm, Network Security |
49 | Yong Cui 0001, Lingjian Song, Ke Xu 0002 |
RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks.  |
ICOIN  |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION.  |
ISA  |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
46 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IPMultimedia subsystem.  |
GECCO (Companion)  |
2008 |
DBLP DOI BibTeX RDF |
network security, artificial immune systems, ip multimedia subsystem |
46 | Aliya Awais, Muddassar Farooq, Muhammad Younus Javed |
Attack analysis & bio-inspired security framework for IP multimedia subsystem.  |
GECCO  |
2008 |
DBLP DOI BibTeX RDF |
network, artificial immune systems, IP multimedia subsystem |
43 | Song Huang, Ling Zhang 0005, Shouling Dong |
A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks.  |
ICICS  |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Fang-Yie Leu, Chia-Chi Pai |
Detecting DoS and DDoS Attacks Using Chi-Square.  |
IAS  |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Tong Liu, Chwan-Hwa John Wu |
Intrusion-resilient, DDoS-resistant and agent-assisted network security system.  |
BROADNETS  |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang |
A Performance-Based Grid Intrusion Detection System.  |
COMPSAC (1)  |
2005 |
DBLP DOI BibTeX RDF |
PGIDS, Grid, DoS, DDoS, SSA, BPNN, SAA |
38 | Kihong Park, Heejo Lee |
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets.  |
SIGCOMM  |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Gitae Kim, Tony J. Bogovic, Dana Chee |
ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks.  |
ISCC  |
2001 |
DBLP DOI BibTeX RDF |
Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring |
32 | Shunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi |
Comparison of Properties between Entropy and Chi-Square Based Anomaly Detection Method.  |
NBiS  |
2011 |
DBLP DOI BibTeX RDF |
DoS/DDoS detection, chi-square value, Entropy, anomaly detection, statistical approach |
29 | Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang |
Unified Defense Against DDoS Attacks.  |
Networking  |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour |
A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN.  |
ICC  |
2008 |
DBLP DOI BibTeX RDF |
|
28 | RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo |
An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection.  |
ICN (1)  |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi Xu |
On the Issues of IP Traceback for IPv6 and Mobile IPv6.  |
ISCC  |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Xuan-Ha Nguyen, Kim-Hung Le |
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model.  |
Internet Things  |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang |
DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol.  |
Comput. Networks  |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Peyman Khordadpour, Saeed Ahmadi |
FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing.  |
CoRR  |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Farouq Aliyu, Tarek R. Sheltami, Marwan H. Abu-Amara, Mohamed Deriche 0001, Ashraf S. Mahmoud |
Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks.  |
ACR  |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai |
Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 Dataset.  |
ICISSP  |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Hikofumi Suzuki, Akiyoshi Iwasa, Takumi Uchiyama, Katsumi Wasaki |
Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram Generation.  |
NaNA  |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Bushra Alhijawi, Sufyan Almajali, Hany Elgala, Haythem Bany Salameh, Moussa Ayyash |
A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets.  |
Comput. Electr. Eng.  |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, Niloy Saha, Raouf Boutaba |
SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices.  |
FNWF  |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu |
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.  |
MobiSec  |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Jorge Steven Martinez Osorio, Jaime Alberto Vergara Tejada, Juan Felipe Botero |
Detection of DoS/DDoS attacks: the UBM and GMM approach.  |
IM  |
2021 |
DBLP BibTeX RDF |
|
24 | Giorgi Iashvili, Maksim Iavich, Razvan Bocu, Roman Odarchenko, Sergiy Gnatyuk |
Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks.  |
IDAACS  |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Leonid Galchynsky, Mykola Graivoronskyi, Oleh O. Dmytrenko |
Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT.  |
ITS  |
2021 |
DBLP BibTeX RDF |
|
24 | Jia Chen, Haiyu Jia, Qi Liu 0003 |
Dual-collaborative DoS/DDoS mitigation approach in information-centric mobile Internet.  |
Int. J. Commun. Syst.  |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Liming Fang 0001, Bo Zhao, Yang Li 0103, Zhe Liu 0001, Chunpeng Ge, Weizhi Meng 0001 |
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.  |
IEEE Netw.  |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Francisco Sales de Lima Filho, Frederico Augusto Fernandes Silveira, Agostinho de Medeiros Brito Júnior, Genoveva Vargas-Solar, Luiz Felipe Q. Silveira |
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning.  |
Secur. Commun. Networks  |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Rajendra Patil, Harsha Dudeja, Snehal Gawade, Chirag Modi 0001 |
Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud.  |
ICCCNT  |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Osman Ali, Paul Cotae |
Towards DoS/DDoS Attack Detection Using Artificial Neural Networks.  |
UEMCON  |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Marcos V. O. de Assis, Anderson H. Hamamoto, Taufik Abrão, Mario Lemes Proença Jr. |
A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks.  |
IEEE Access  |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Yanghong Zhou |
Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance.  |
HPCC/CSS/ICESS  |
2015 |
DBLP DOI BibTeX RDF |
|
24 | |
Radware Lagebericht: DoS-/DDoS-Attacken unter den aktuell größten Gefahren für die IT-Sicherheit.  |
Datenschutz und Datensicherheit  |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Mohammed A. Saleh, Azizah Abdul Manaf |
Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review.  |
AMLTA  |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Alex Doyal, Justin Zhan |
Triple DoS: DDoS defence and traceback.  |
Int. J. Inf. Priv. Secur. Integr.  |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Daeyoub Kim, Jihoon Lee |
How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack.  |
IEICE Trans. Commun.  |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Theodoros Spyridopoulos, G. Karanikas, Theodore Tryfonas, Georgios Oikonomou |
A game theoretic defence framework against DoS/DDoS cyber attacks.  |
Comput. Secur.  |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Uliana Yatsykovska, Mykola Karpinski, Ihor Vasyltsov, Pavlo Bykovyy |
The monitoring system of DoS/DDoS attacks in the global network.  |
IDAACS (2)  |
2011 |
DBLP DOI BibTeX RDF |
|
24 | PyungKoo Park, HeeKyoung Yi, Sangjin Hong, Jaecheol Ryou 0001 |
An effective defense mechanism against DoS/DDoS attacks in flow-based routers.  |
MoMM  |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Ping Du, Shunji Abe |
IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks.  |
IEICE Trans. Inf. Syst.  |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Takanori Komatsu, Akira Namatame |
On the Effectiveness of Rate-Limiting Methods to Mitigate Distributed DoS (DDoS) Attacks.  |
IEICE Trans. Commun.  |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jin Shu, Fengyu Liu, Manwu Xu |
Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks.  |
Security and Management  |
2005 |
DBLP BibTeX RDF |
|
24 | Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman |
Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation Scheme.  |
SEC  |
2005 |
DBLP BibTeX RDF |
|
19 | Jun Bi, Ping Hu, Lizhong Xie |
Shim6: Reference Implementation and Optimization.  |
Networking  |
2008 |
DBLP DOI BibTeX RDF |
IPv6, Multihoming, Shim6 |
19 | Yan Shen, Jun Bi, Jianping Wu, Qiang Liu |
The Automatic Peer-to-Peer Signature for Source Address Validation.  |
KES (1)  |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Spoofing Prevention, Key Management |
19 | Yang Li 0002, Binxing Fang |
A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods.  |
ICNP  |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Muthusrinivasan Muthuprasanna, G. Manimaran, Mansoor Alicherry, Vijay Kumar |
Coloring the Internet: IP Traceback.  |
ICPADS (1)  |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Hai-Tao He, Xiao-Nan Luo, Bao-Lu Liu |
Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches.  |
ICIC (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Fu-Hau Hsu, Tzi-cker Chiueh |
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security.  |
ACSAC  |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma |
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.  |
ICICS  |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #66 of 66 (100 per page; Change: )
|