Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
223 | Haining Wang, Danlu Zhang, Kang G. Shin |
SYN-dog: Sniffing SYN Flooding Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002, pp. 421-428, 2002, IEEE Computer Society, 0-7695-1585-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
185 | Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang |
LSAD: Lightweight SYN Flooding Attack Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 385-390, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
network security, network intrusion detection system, SYN flooding |
147 | Seung-Won Shin, Ki-Young Kim, Jong-Soo Jang |
D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January - 4 February 2005, Trento, Italy, pp. 430-436, 2005, IEEE Computer Society, 0-7695-2262-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
144 | Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu |
Counteract SYN flooding using second chance packet filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 216-220, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
second chance packet filter, security, wireless LAN, DDoS, SYN flooding |
136 | Vladimir V. Shakhov, Hyunseung Choo |
On Modeling Counteraction against TCP SYN Flooding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking. Towards Ubiquitous Networking and Services, International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 574-583, 2007, Springer, 978-3-540-89523-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TCP SYN flooding, defense mechanism, DDoS attack |
129 | BoonPing Lim, Md. Safi Uddin |
Statistical-Based SYN-Flooding Detection Using Programmable Network Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 465-470, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
non-parametric CUSUM, token bucket filtering, network security, network processor, SYN-flooding |
112 | Y. W. Chen |
Study on the prevention of SYN flooding by using traffic policing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: The Networked Planet: Management Beyond 2000, 7th IEEE/IFIP Network Operations and Management Symposium, NOMS 2000, Honolulu, HI, USA, April 10-14, 2000. Proceedings, pp. 593-604, 2000, IEEE, 0-7803-5928-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
109 | Wei Chen, Dit-Yan Yeung |
Throttling spoofed SYN flooding traffic at the source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 33(1-3), pp. 47-65, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding |
98 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He, Edwin Hsing-Mean Sha |
An Active Detecting Method Against SYN Flooding Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 709-715, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
84 | Ting Xue, Natalija Vlajic |
Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 746-749, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
83 | Basheer Al-Duwairi, G. Manimaran |
Intentional dropping: a novel scheme for SYN flooding mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 2820-2824, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Wei Chen, Dit-Yan Yeung |
Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN/ICONS/MCL ![In: Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April 2006, Mauritius, pp. 38, 2006, IEEE Computer Society, 0-7695-2552-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
64 | V. Krishna Nandivada, Jens Palsberg |
Timing Analysis of TCP Servers for Surviving Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real-Time and Embedded Technology and Applications Symposium ![In: 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 7-10 March 2005, San Francisco, CA, USA, pp. 541-549, 2005, IEEE Computer Society, 0-7695-2302-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni |
Analysis of a Denial of Service Attack on TCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 208-223, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
63 | Dongqing Yuan, Jiling Zhong |
A lab implementation of SYN flood attack and defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 9th Conference on Information Technology Education, SIGITE 2008, Cincinnati, OH, USA, October 16-18, 2008, pp. 57-58, 2008, ACM, 978-1-60558-329-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, curriculum, laboratory |
55 | Chun-Hao Yang, Jhen-Ping Wu, Fang-Yi Lee, Ting-Yu Lin, Meng-Hsun Tsai |
Detection and Mitigation of SYN Flooding Attacks through SYN/ACK Packets and Black/White Lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(8), pp. 3817, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
55 | Reza Mohammadi 0003, Mauro Conti, Chhagan Lal, Satish C. Kulhari |
SYN-Guard: An effective counter for SYN flooding attack in software-defined networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 32(17), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
55 | L. Kavisankar, Chenniappan Chellappan |
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1110.1753, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
50 | Sanjay Rawat 0001, Ashutosh Saxena |
Danger theory based SYN flood attack detection in autonomic network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 213-218, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory |
47 | Zi-Yang Shen, Ming-Wei Su, Yun-Zhan Cai, Meng-Hsun Tsai |
Mitigating SYN Flooding and UDP Flooding in P4-based SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 22nd Asia-Pacific Network Operations and Management Symposium, APNOMS 2021, Tainan, Taiwan, September 8-10, 2021, pp. 374-377, 2021, IEEE, 978-4-88552-332-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Kirill Levchenko, Ramamohan Paturi, George Varghese |
On the difficulty of scalably detecting network attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 12-20, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
communication complexity, network intrusion detection |
39 | Ramana Rao Kompella, Sumeet Singh, George Varghese |
On scalable attack detection in the network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(1), pp. 14-25, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding |
35 | Daesung Lee 0001, Ki-Chang Kim, Year Back Yoo |
Enhancing Security by Embedding Biometric Data in IP Header. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFSEM (1) ![In: SOFSEM 2007: Theory and Practice of Computer Science, 33rd Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 20-26, 2007, Proceedings, pp. 726-737, 2007, Springer, 978-3-540-69506-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie, Yu-Lung Tsai |
Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMCOM ![In: 17th International Conference on Ubiquitous Information Management and Communication, IMCOM 2023, Seoul, Korea, Republic of, January 3-5, 2023, pp. 1-8, 2023, IEEE, 978-1-6654-5348-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Sayed Qaiser Ali Shah, Farrukh Zeeshan Khan, Muneer Ahmad |
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 182, pp. 198-211, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Dalia Nashat, Fatma A. Hussain |
Multifractal detrended fluctuation analysis based detection for SYN flooding attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 107, pp. 102315, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
34 | Ting-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang 0002, Yun-Zhan Cai, Meng-Hsun Tsai |
Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 21st Asia-Pacific Network Operations and Management Symposium, APNOMS 2020, Daegu, South Korea, September 22-25, 2020, pp. 114-119, 2020, IEEE, 978-89-950043-8-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
34 | DongHyuk Kim, Phuc Trinh Dinh, Sichul Noh, Junmin Yi, Minho Park |
An Effective Defense Against SYN Flooding Attack in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: 2019 International Conference on Information and Communication Technology Convergence, ICTC 2019, Jeju Island, Korea (South), October 16-18, 2019, pp. 369-371, 2019, IEEE, 978-1-7281-0893-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Nan Haymarn Oo, Aung Htein Maw |
Effective Detection and Mitigation of SYN Flooding Attack in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIT ![In: 19th International Symposium on Communications and Information Technologies, ISCIT 2019, Ho Chi Minh City, Vietnam, September 25-27, 2019, pp. 300-305, 2019, IEEE, 978-1-7281-5009-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
34 | T. Sasilatha, S. Balaji, P. Suresh Mohan Kumar |
An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Energy Web ![In: EAI Endorsed Trans. Energy Web 5(20), pp. e7, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Joseph Cosmas Mushi, Mussa Kissaka, Kosmas Kapis |
ACO-Based Measure for SYN Flooding Over Mobile Data Connectivity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Recent Trends and Future Technology in Applied Intelligence - 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedings, pp. 454-461, 2018, Springer, 978-3-319-92057-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Reza Mohammadi 0003, Reza Javidan, Mauro Conti |
SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 14(2), pp. 487-497, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Nenekazi Nokuthala Penelope Mkuzangwe, Fulufhelo Vincent Nelwamondo |
A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIIDS (2) ![In: Intelligent Information and Database Systems - 9th Asian Conference, ACIIDS 2017, Kanazawa, Japan, April 3-5, 2017, Proceedings, Part II, pp. 14-22, 2017, 978-3-319-54429-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Xinyu Liu, Beumjin Cho, Jong Kim 0001 |
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers, pp. 29-41, 2016, 978-3-319-56548-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Lihua Miao, Wei Ding 0001, Jian Gong |
A real-time method for detecting internet-wide SYN flooding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LANMAN ![In: 2015 IEEE International Workshop on Local and Metropolitan Area Networks, LANMAN 2015, Beijing, China, April 22-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4673-6761-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Shahram Jamali, Vahid Shaker |
Defense against SYN flooding attacks: A particle swarm optimization approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 40(6), pp. 2013-2025, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Shahram Jamali, Gholam Shaker |
PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Appl. ![In: Comput. Math. Appl. 63(1), pp. 214-221, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Saravanan Kumarasamy, A. Gowrishankar |
An Active Defense Mechanism for TCP SYN flooding attacks ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1201.2103, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
34 | Tongguang Zhang |
Cumulative Sum Algorithm for Detecting SYN Flooding Attacks ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1212.5129, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
34 | Mehdi Ebady Manaa, Angela Amphawan |
Review of syn-flooding attack detection mechanism ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1202.1761, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
34 | Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang |
Detecting SYN flooding attacks based on traffic prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 5(10), pp. 1131-1140, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Martine Bellaïche, Jean-Charles Grégoire |
SYN flooding attack detection by TCP handshake anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 5(7), pp. 709-724, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Rakesh Kumar Sahu, Narendra S. Chaudhari |
A performance analysis of network under SYN-flooding attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOCN ![In: Ninth International Conference on Wireless and Optical Communications Networks, WOCN 2012, Indore, India, September 20-22, 2012, pp. 1-3, 2012, IEEE, 978-1-4673-1988-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | |
TCP SYN Flooding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1283, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Maciej Korczynski, Lucjan Janowski, Andrzej Duda |
An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 5-9 June, 2011, pp. 1-5, 2011, IEEE, 978-1-61284-232-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Laleh Arshadi, Amir-Hossein Jahangir |
Entropy based SYN flooding detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: IEEE 36th Conference on Local Computer Networks, LCN 2011, Bonn, Germany, October 4-7, 2011, pp. 139-142, 2011, IEEE Computer Society, 978-1-61284-926-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Hamid R. Alipour, Mostafa Esmaeili, Kashefi Kia |
Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 2(1), pp. 49-57, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Martine Bellaïche, Jean-Charles Grégoire |
SYN Flooding Attack Detection Based on Entropy Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009, pp. 1-6, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Bin Xiao 0001, Wei Chen 0006, Yanxiang He |
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Parallel Distributed Comput. ![In: J. Parallel Distributed Comput. 68(4), pp. 456-470, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Haïdar Safa, Mohamad Chouman, Hassan Artail, Marcel Karam |
A collaborative defense mechanism against SYN flooding attacks in IP networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 31(4), pp. 509-534, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Dalia Nashat, Xiaohong Jiang 0001, Susumu Horiguchi |
Detecting SYN Flooding Agents under Any Type of IP Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2008 IEEE International Conference on e-Business Engineering, ICEBE 2008, Xi'an, China, October 22-24, 2008, pp. 499-505, 2008, IEEE Computer Society, 978-0-7695-3395-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Tae-Hyung Kim, Young-Sik Choi, Jong Kim 0001, Sung Je Hong |
Annulling SYN Flooding Attacks with Whitelist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 371-376, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Gowri Shankar Annadurai, Saravanan Kumarasamy |
Defense Mechanism for TCP SYN Flooding Attacks using Compression Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Internet Computing ![In: Proceedings of the 2008 International Conference on Internet Computing, ICOMP 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pp. 48-52, 2008, CSREA Press, 1-60132-073-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
34 | Wesley M. Eddy |
TCP SYN Flooding Attacks and Common Mitigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4987, pp. 1-19, August 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Vasilios A. Siris, Fotini Papagalou |
Application of anomaly detection algorithms for detecting SYN flooding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 29(9), pp. 1433-1442, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Hiroshi Fujinoki, Ravi Kumar Boyapati |
Performance studies of the server-side access control for syn-flooding distributed denial of service attacks using real systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communication, Network, and Information Security ![In: Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, USA, pp. 172-178, 2006, IASTED/ACTA Press, 0-88986-636-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
34 | Basheer Al-Duwairi, G. Manimaran |
Intentional Dropping: A Novel Scheme for SYN Flooding Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2006. 25th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain, 2006, IEEE, 1-4244-0221-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Dinil Mon Divakaran, Hema A. Murthy, Timothy A. Gonsalves |
Detection of Syn Flooding Attacks using Linear Prediction Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: 14th IEEE International Conference on Networks, ICON 2006, Singapore, 13-15 September 2006, pp. 1-6, 2006, IEEE, 0-7803-9746-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Yanxiang He, Wei Chen 0006, Bin Xiao 0001 |
Detecting SYN Flooding Attacks Near Innocent Side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings, pp. 443-452, 2005, Springer, 3-540-30856-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Vasilios A. Siris, Fotini Papagalou |
Application of anomaly detection algorithms for detecting SYN flooding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November - 3 December 2004, pp. 2050-2054, 2004, IEEE, 0-7803-8794-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Haining Wang, Danlu Zhang, Kang G. Shin |
Detecting SYN Flooding Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: Proceedings IEEE INFOCOM 2002, The 21st Annual Joint Conference of the IEEE Computer and Communications Societies, New York, USA, June 23-27, 2002, pp. 1530-1539, 2002, IEEE Computer Society, 0-7803-7477-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Meiko Jensen, Nils Gruschka, Norbert Luttenberger |
The Impact of Flooding Attacks on Network-based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 509-513, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web Services, availability, DoS, attacks, flooding |
29 | Jungtaek Seo |
An Attack Classification Mechanism Based on Multiple Support Vector Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 94-103, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
attack classification, intrusion detection, Internet security |
29 | Martín Casado, Pei Cao, Aditya Akella, Niels Provos |
Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWQoS ![In: Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS 2006, New Haven, CT, USA, 19-21 June 2006, Proceedings, pp. 286-287, 2006, IEEE, 1-4244-0476-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Yi Shi, Xinyu Yang |
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 364-374, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Haining Wang, Danlu Zhang, Kang G. Shin |
Change-Point Monitoring for the Detection of DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(4), pp. 193-208, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
CUSUM algorithm, protocol behavior, intrusion detection, DoS attacks |
21 | Gunwoo Nam, Pushkar Patankar, Seung-Hwan Lim, Bikash Sharma, George Kesidis, Chita R. Das |
Clock-like Flow Replacement Schemes for Resilient Flow Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 22-26 June 2009, Montreal, Québec, Canada, pp. 129-136, 2009, IEEE Computer Society, 978-0-7695-3659-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano |
A Study on Detecting Network Anomalies Using Sampled Flow Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 81, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Zhuo Ning, Jian Gong |
An Intrusion Plan Recognition Algorithm Based on Max-1-Connected Causal Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 809-816, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Max_1_connected Causal Network, belief updating, MAP, NIDS |
21 | Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 |
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 26(2), pp. 28-39, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix |
21 | Alexander G. Tartakovsky, Boris Rozovskii, Rudolf B. Blazek, Hongjoong Kim |
A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 54(9), pp. 3372-3382, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yan Gao 0003, Zhichun Li, Yan Chen 0004 |
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pp. 39, 2006, IEEE Computer Society, 0-7695-2540-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn |
A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 320-328, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian |
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 387-396, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain |
21 | Ulf Lindqvist, Phillip A. Porras |
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1999 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999, pp. 146-161, 1999, IEEE Computer Society, 0-7695-0176-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|