|
[1]S. C. Lin, & S. S. Tseng, Constructing detection knowledge for DDoS intrusion tolerance. Expert Systems with Applications, Vol. 27, 2004, pp. 379–390. [2]Cabrera, J. B. D. et al. Proactive detection of distributed denial of service attacks using MIB traffic variables-A feasibility study. In Proceedings of the seventh IFIP/IEEE international symposium on integrated network management, Seattle, May, (2001) pp. 1-14. [3]Jaehak Yu, Hansung Lee, Myung-Sup Kim *, Daihee Park. Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications 31 (2008) pp. 4212-4219 [4]Keunsoo Lee *, Juhyun Kim, Ki Hoon Kwon, Younggoo Han, Sehun Kim, DDoS attack detection method using cluster analysis Expert Systems with Applications 34 (2008) pp. 1659-1665 [5]Jung, J. & Krishnamurthy, B. Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites. In Proceedings of ACM conference on computer and communications security, May (2002) pp. 30-41. [6]Lee, F. Y., & Shieh, S. Defending against spoofed DDoS attacks with path fingerprint. Computers and Security, 24(7), (2005) pp. 571-586. [7]Basheer Al-Duwairi *, G. Manimaran. Distributed packet pairing for reflector based DDoS attack mitigation. Computer Communications 29 (2006) pp. 2269-2280 [8]Vasilios A. Siris, Ilias Stavrakis. Provider-based deterministic packet marking against distributed DoS attacks. Journal of Network and Computer Applications 30 (2007) pp. 858-876 [9]Kejie Lu, Dapeng Wu, Jieyan Fan, Sinisa Todorovic, Antonio Nucci. Robust and efficient detection of DDoS attacks for large-scale internet. Computer Networks 51 (2007) pp. 5036-5056 [10]Shigang Chena, Yong Tanga, Wenliang Dub. Stateful DDoS attacks and targeted filtering. Journal of Network and Computer Applications 30 (2007) pp. 823-840 [11]Hyunsang Choi, Heejo Lee*, Hyogon Kim. Fast detection and visualization of network attacks on parallel coordinates. computers& security 28 (2009) pp. 276-288 [12]Safaa O. Al-Mamory *, Hongli Zhang. Intrusion detection alarms reduction using root cause analysis and clustering. Computer Communications 32 (2009) pp. 419-430 [13]Niandong Liao *, Shengfeng Tian, Tinghua Wang. Network forensics based on fuzzy logic and expert system. Computer Communications 32 (2009) pp. 1881-1892 [14]Yen John, Langari Reza, "Fuzzy Logic:Intelligence, Control, and Information," Prentice Hall, 1998 [15]李允中、王小璠、蘇木春,“模糊理論及其應用”,全華科技圖書有限公司,2003 [16]php, Available form http://zh.wikipedia.org/wiki/PHP [17]drupal, Available form http://drupal.org/
|