Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Girma, Anteneh, Moses Garuba, Jiang Li, and Chunmei Liu (2015). Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. In Information Technology- New Generations (ITNG), IEEE - 2015 12th International Conference on, pp.212-217 |
Sách, tạp chí |
Tiêu đề: |
Information Technology-New Generations (ITNG), "IEEE" - 2015 12th International Conference on |
Tác giả: |
Girma, Anteneh, Moses Garuba, Jiang Li, and Chunmei Liu |
Năm: |
2015 |
|
[2] Miao, Chen, Jie Yang, Weimin Li, and Zhenming Lei (2012). A DDoS Detection Mechanism Based on Flow Analysis. In Proceedings of the 2012 International Conference on Electronics, Communications and Control, IEEE Computer Society, pp. 2245-2249 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the 2012 International Conference on Electronics, Communications and Control |
Tác giả: |
Miao, Chen, Jie Yang, Weimin Li, and Zhenming Lei |
Năm: |
2012 |
|
[3] He, Xiaowei, Shuyuan Jin, Yunxue Yang, and Huiqiang Chi (2014). DDoS Detection Based on Second-Order Features and Machine Learning.In Trustworthy Computing and Services, pp. 197-205. Springer Berlin Heidelberg |
Sách, tạp chí |
Tiêu đề: |
Trustworthy Computing and Services |
Tác giả: |
He, Xiaowei, Shuyuan Jin, Yunxue Yang, and Huiqiang Chi |
Năm: |
2014 |
|
[5] Xylogiannopoulos, Konstantinos, Panagiotis Karampelas, and Reda Alhajj (2014). Early DDoS Detection Based on Data Mining Techniques.In Information Security Theory and Practice. Securing the Internet of Things, pp. 190-199. Springer Berlin Heidelberg |
Sách, tạp chí |
Tiêu đề: |
Information Security Theory and Practice. Securing the Internet of Things |
Tác giả: |
Xylogiannopoulos, Konstantinos, Panagiotis Karampelas, and Reda Alhajj |
Năm: |
2014 |
|
[9] Cormode, Graham, and S. Muthukrishnan (2005). What’s hot and what’s not: tracking most frequent items dynamically. ACM Transactions on Database Systems, Vol. 30, No. 1, pp. 249–278 |
Sách, tạp chí |
Tiêu đề: |
ACM Transactions on Database Systems |
Tác giả: |
Cormode, Graham, and S. Muthukrishnan |
Năm: |
2005 |
|
[10] Graham Cormode and S. Muthukrishnan (2005). An improved Data-stream summary: The Count-min Sketch and its Applications. Journal of Algorithms, vol. 55, pp.58-75 |
Sách, tạp chí |
Tiêu đề: |
Journal of Algorithms |
Tác giả: |
Graham Cormode and S. Muthukrishnan |
Năm: |
2005 |
|
[11] Ying Xuan, Incheol Shin, My T. Thai, Taieb Znati. Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. Parallel and Distributed Systems, IEEE Transactions on (Volume:21 , Issue: 8 ), 2010 [12] Khattab S., Bobriel S., Melhem R., and Mosse D (2008). Live Baiting forService-level DoS Attackers. INFOCOM |
Sách, tạp chí |
Tiêu đề: |
Parallel and Distributed Systems, IEEE Transactions on (Volume:21 , Issue: 8 )", 2010 [12] Khattab S., Bobriel S., Melhem R., and Mosse D (2008). Live Baiting for Service-level DoS Attackers |
Tác giả: |
Ying Xuan, Incheol Shin, My T. Thai, Taieb Znati. Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. Parallel and Distributed Systems, IEEE Transactions on (Volume:21 , Issue: 8 ), 2010 [12] Khattab S., Bobriel S., Melhem R., and Mosse D |
Năm: |
2008 |
|
[16] Zing-Zhu Du, Frank K. Hwang, Combinatorial Group Testing and Its Applications, 2 nd Edition, World Scientific, 2000, pp. 133-134 |
Sách, tạp chí |
Tiêu đề: |
Combinatorial Group Testing and Its Applications, 2"nd" Edition |
|
[17] Piotr Indyk , Hung Q. Ngo, and Atri Rudra (2010). Efficiently decodable nonadaptive group testing. In Proceedings of the Twenty-First Annual ACMSIAM Symposium on Discrete Algorithms (SODA), pp. 1126-1142 |
Sách, tạp chí |
Tiêu đề: |
Proceedings of the Twenty-First Annual ACMSIAM Symposium on Discrete Algorithms (SODA) |
Tác giả: |
Piotr Indyk , Hung Q. Ngo, and Atri Rudra |
Năm: |
2010 |
|
[20] OpenVAS Solution. URL: https://www.openvas.org/index.html 3/01/2020 [21] Libpcap and Protocol Observer https://www.circonus.com/2018/05/cassandra-query-observability-with-libpcap-and-protocol-observer/ 3/01/2020 |
Link |
|
[4] Nadiammai, G. V., and M. Hemalatha (2014). Effective approach toward Intrusion Detection System using data mining techniques. Egyptian Informatics Journal15, no. 1, pp. 37-50 |
Khác |
|
[6] Prajapati, N. M., Mishra, A., & Bhanodia, P. (2014). Literature survey-IDS for DDoS attacks. In IT in Business, Industry and Government (CSIBIG), 2014 Conference on (pp. 1-3). IEEE |
Khác |
|
[7] Cormode, G., & Hadjieleftheriou, M (2009). Finding the frequent items in streams of data. Communications of the ACM, 52(10), pp.97-105 |
Khác |
|
[13] Graham Cormode and S. Muthukrishnan (2005). What’s new: finding significant differences in network data streams. IEEE/ACM Trans. Netw., 13(6):1219–1232 |
Khác |
|
[14] Huynh Nguyen Chinh, Nguyen Dinh Thuc, Tan Hanh (2013). Finding HotIPs in network using group testing method – A review. Journal of Engineering Technology and Education – Kuas,Taiwan, pp.374-379 |
Khác |
|
[15] Kautz, W., and Roy Singleton (1964). Nonrandom binary superimposed codes. Information Theory, IEEE Transactions on 10, No. 4, pp. 363-377 |
Khác |
|
[18] Huynh Nguyen Chinh (2015). Fast detecting Hot-IPs in high speed networks. Science & Technology Development, Vol 18, No.T4-2015, pp.242- 253 |
Khác |
|