Open Access
Issue |
ITM Web Conf.
Volume 37, 2021
International Conference on Innovative Technology for Sustainable Development (ICITSD-2021)
|
|
---|---|---|
Article Number | 01025 | |
Number of page(s) | 8 | |
Section | Innovative Technology for Sustainable Development | |
DOI | https://doi.org/10.1051/itmconf/20213701025 | |
Published online | 17 March 2021 |
- G. Linden, “Make Data Useful”, Presentation, Amazon, November, 2006. [Google Scholar]
- V. Paxson, M. Allman, J. Chu and M. Sargent, “Computing TCP’s Retransmission Timer”, https://tools.ietf.org/html/rfc6298, 2011. [Google Scholar]
- Al-Haidari, F., Salah, K., Sqalli, M. et al., “Performance Modeling and Analysis of the EDoS-Shield Mitigation”, Arab J Sci Eng, Springer, 42, 793–804 (2017). https://doi.org/10.1007/s13369-016-2331-z. [Google Scholar]
- Eytan Modiano, “Introduction to Queueing Theory “, http://web.mit.edu/modiano/www/6.263/lec5- 6.pdf [Google Scholar]
- Mishra, Ayush & Sun, Xiangpeng & Jain, Atishya & Pande, Sameer & Joshi, Raj & Leong, Ben. (2019). The Great Internet TCP Congestion Control Census. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3. 1-24. 10.1145/3366693. [Google Scholar]
- AWS Admin, “TCP BBR Congestion Control With Amazon CloudFront”, https://aws.amazon.com/blogs/networking-and-content-delivery/tcp-bbr-congestion-control-with- amazon-cloudfront/. [Google Scholar]
- Colt McAnlis, “TCP BBR: Magic dust for network performance”, https://medium.com/google- cloud/tcp-bbr-magic-dust-for-network-performance-57a5f1ccf437. [Google Scholar]
- Xiang, Y., Li, K. and Zhou, W. (2011), ‘Low-rate ddos attacks detection and traceback by using new information metrics’, IEEE transactions on information forensics and security 6(2), 426–437. [Google Scholar]
- Luo, J., Yang, X., Wang, J., Xu, J., Sun, J. and Long, K. (2014), ‘On a mathematical model for low-rate shrew ddos’, IEEE Transactions on Information Forensics and Security 9(7), 1069–1083. [Google Scholar]
- Bhuyan, M. H., Bhattacharyya, D. and Kalita, J. K. (2015), ‘An empirical evaluation of information metrics for low-rate and high-rate ddos attack detection’, Pattern Recognition Letters 51, 1–7. [Google Scholar]
- Zhang, C., Yin, J., Cai, Z. and Chen, W. (2010), ‘Rred: robust red algorithm to counter low-rate denial-of-service attacks’, IEEE Communications Letters 14(5), 489–491. [Google Scholar]
- Wu, Z., Zhang, L. and Yue, M. (2015), ‘Low-rate dos attacks detection based on network multifractal’, IEEE Transactions on Dependable and Secure Computing 13(5), 559–567. [Google Scholar]
- Yu, H. (2007), Dos-resilient secure aggregation queries in sensor networks, in ‘Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing’, ACM, pp. 394–395. [Google Scholar]
- Gayathri R and Neelanarayanan V, “Denial of Service Attack prediction using Gradient Descent Algorithm”, Advances in Internet Research and Engineering (Springer Nature), Vol:1(45), pp.18, 2020 [Google Scholar]
- Gayathri R and Neelanarayanan V, “Identification of Regression function and distribution model for Denial of Service attack in Second Life online community using Simple Network Management Protocol”, International Journal of Web Based Online Communities, Inderscience, Vol:15(3), pp.225-237, August 2019 [Google Scholar]
- Gayathri R and Neelanarayanan V, “DoS detection solution for cloud platform using SNMP”, International Journal of Pure and Applied Mathematics, vol.119 (11), pp.175-183, 2018. [Google Scholar]
- Xiao, L., Wei, W., Yang, W., Shen, Y. and Wu, X. (2017), ‘A protocol-free detection against cloud oriented reflection dos attacks’, Soft Computing 21(13), 3713–3721. [Google Scholar]
- Thapngam, T., Yu, S., Zhou, W. and Makki, S. K. (2014), ‘Distributed denial of service (ddos) detection by traffic pattern analysis’, Peer-to-peer networking and applications 7(4), 346–358. [Google Scholar]
- Stavrou, A., Fleck, D. and Kolias, C. (2016), ‘On the move: Evading distributed denialofservice attacks’, Computer 49(3), 104–107. [Google Scholar]
- Shevtekar, A., Anantharam, K. and Ansari, N. (2005), ‘Low rate tcp denial-of-service attack detection at edge routers’, IEEE Communications Letters 9(4), 363–365. [Google Scholar]
- Luo, X., Chan, E.W. and Chang, R. K. (2006), Vanguard: a new detection scheme for a class of tcp-targeted denial-of-service attacks, in ‘2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006’, IEEE, pp. 507–518. [Google Scholar]
- Liu, Z. and Guan, L. (2010), Attack simulation and signature extraction of low-rate dos, in ‘2010 Third International Symposium on Intelligent Information Technology and Security Informatics’, IEEE, pp. 544–548. [Google Scholar]
- Kline, E., Afanasyev, A. and Reiher, P. (2011), Shield: Dos filtering using traffic deflecting, in ‘2011 19th IEEE International Conference on Network Protocols’, IEEE, pp. 37–42. [Google Scholar]
- Kiuchi, T., Hori, Y. and Sakurai, K. (2010), A design of history based traffic filtering with probabilistic packet marking against dos attacks, in ‘2010 10th IEEE/IPSJ International Symposium on Applications and the Internet’, IEEE, pp. 261–264. [Google Scholar]
- Jingle, I. D. J., Rajsingh, E. B. and Paul, P. M. (n.d.), ‘Distributed detection of dos using clock values in wireless broadband networks’, International Journal of Engineering and Advanced Technology (IJEAT) ISSN pp. 2249–8958. [Google Scholar]
- Hoque, M. A. and Chakraborty, B. (2015), ‘Anomaly based intrusion detection systems using snmp data’, International Journal of Science, Engineering and Computer Technology 5(3), 44. [Google Scholar]
- Habib, A., Hefeeda, M. and Bhargava, B. K. (2003), Detecting service violations and dos attacks., in ‘NDSS’. [Google Scholar]
- Gao, Z. and Ansari, N. (2005), ‘Tracing cyber attacks from the practical perspective’, IEEE Communications Magazine 43(5), 123–131. [Google Scholar]
- Elleithy, K. M., Blagovic, D., Cheng, W. K. and Sideleau, P. (2005), ‘Denial of service attack techniques: Analysis, implementation and comparison’. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.