TY - JOUR AU - David, J. AU - Thomas, C. PY - 2019 DA - 2019// TI - Efficient ddos flood attack detection using dynamic thresholding on flow-based network traffic JO - Comput Secur VL - 82 UR - https://doi.org/10.1016/j.cose.2019.01.002 DO - 10.1016/j.cose.2019.01.002 ID - David2019 ER - TY - STD TI - Aiello M, Cambiaso E, Scaglione S, Papaleo G (2013) A similarity based approach for application dos attacks detection. In: 2013 IEEE symposium on computers and communications (ISCC), IEEE, pp 000430–000435 ID - ref2 ER - TY - STD TI - Hodo E, Bellekens X, Hamilton A, Dubouilh P-L, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of iot networks using artificial neural network intrusion detection system. In: 2016 international symposium on networks, computers and communications (ISNCC), IEEE, pp 1–6 ID - ref3 ER - TY - JOUR AU - Baig, Z. A. AU - Sanguanpong, S. AU - Firdous, S. N. AU - Nguyen, T. G. AU - So-In, C. PY - 2020 DA - 2020// TI - Averaged dependence estimators for dos attack detection in iot networks JO - Future Gener Comput Syst VL - 102 UR - https://doi.org/10.1016/j.future.2019.08.007 DO - 10.1016/j.future.2019.08.007 ID - Baig2020 ER - TY - STD TI - Dridi L, Zhani MF (2016) Sdn-guard: Dos attacks mitigation in sdn networks. In: 2016 5th IEEE international conference on cloud networking (Cloudnet), IEEE, pp 212–217 ID - ref5 ER - TY - JOUR AU - Imran, M. AU - Durad, M. H. AU - Khan, F. A. AU - Derhab, A. PY - 2019 DA - 2019// TI - Reducing the effects of dos attacks in software defined networks using parallel flow installation JO - Hum Cent Comput Inf Sci VL - 9 UR - https://doi.org/10.1186/s13673-019-0176-7 DO - 10.1186/s13673-019-0176-7 ID - Imran2019 ER - TY - JOUR AU - Masdari, M. AU - Jalali, M. PY - 2016 DA - 2016// TI - A survey and taxonomy of dos attacks in cloud computing JO - Secur Commun Netw VL - 9 UR - https://doi.org/10.1002/sec.1539 DO - 10.1002/sec.1539 ID - Masdari2016 ER - TY - JOUR AU - Gupta, B. AU - Badve, O. P. PY - 2017 DA - 2017// TI - Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment JO - Neural Comput Appl VL - 28 UR - https://doi.org/10.1007/s00521-016-2317-5 DO - 10.1007/s00521-016-2317-5 ID - Gupta2017 ER - TY - JOUR AU - Zhang, H. AU - Qi, Y. AU - Wu, J. AU - Fu, L. AU - He, L. PY - 2016 DA - 2016// TI - Dos attack energy management against remote state estimation JO - IEEE Trans Control Netw Syst VL - 5 UR - https://doi.org/10.1109/TCNS.2016.2614099 DO - 10.1109/TCNS.2016.2614099 ID - Zhang2016 ER - TY - JOUR AU - Luo, J. AU - Yang, X. AU - Wang, J. AU - Xu, J. AU - Sun, J. AU - Long, K. PY - 2014 DA - 2014// TI - On a mathematical model for low-rate shrew ddos JO - IEEE Trans Inf Forensics Secur VL - 9 UR - https://doi.org/10.1109/TIFS.2014.2321034 DO - 10.1109/TIFS.2014.2321034 ID - Luo2014 ER - TY - JOUR AU - Cambiaso, E. AU - Papaleo, G. AU - Chiola, G. AU - Aiello, M. PY - 2013 DA - 2013// TI - Slow dos attacks: definition and categorisation JO - Int J Trust Manage Comput Commun VL - 1 UR - https://doi.org/10.1504/IJTMCC.2013.056440 DO - 10.1504/IJTMCC.2013.056440 ID - Cambiaso2013 ER - TY - STD TI - Mongelli M, Aiello M, Cambiaso E, Papaleo G (2015) Detection of dos attacks through fourier transform and mutual information. In: 2015 IEEE international conference on communications (ICC), IEEE, pp 7204–7209 ID - ref12 ER - TY - JOUR AU - Yue, M. AU - Wang, M. AU - Wu, Z. PY - 2019 DA - 2019// TI - Low-high burst: a double potency varying-rtt based full-buffer shrew attack model JO - IEEE Trans Dependable Secure Comput UR - https://doi.org/10.1109/TDSC.2019.2948167 DO - 10.1109/TDSC.2019.2948167 ID - Yue2019 ER - TY - JOUR AU - Maciá-Fernández, G. AU - Rodríguez-Gómez, R. A. AU - Díaz-Verdejo, J. E. PY - 2010 DA - 2010// TI - Defense techniques for low-rate dos attacks against application servers JO - Comput Netw VL - 54 UR - https://doi.org/10.1016/j.comnet.2010.05.002 DO - 10.1016/j.comnet.2010.05.002 ID - Maciá-Fernández2010 ER - TY - STD TI - Cambiaso E, Papaleo G, Chiola G, Aiello M (2015) Designing and modeling the slow next dos attack. In: Computational intelligence in security for information systems conference, Springer, pp 249–259 ID - ref15 ER - TY - JOUR AU - Cambiaso, E. AU - Papaleo, G. AU - Aiello, M. PY - 2017 DA - 2017// TI - Slowcomm: design, development and performance evaluation of a new slow dos attack JO - J Inf Secur Appl VL - 35 ID - Cambiaso2017 ER - TY - JOUR AU - Cui, T. AU - Andrew, L. L. AU - Zukerman, M. AU - Tan, L. PY - 2006 DA - 2006// TI - Improving the fairness of fast tcp to new flows JO - IEEE Commun Lett VL - 10 UR - https://doi.org/10.1109/LCOMM.2006.1633341 DO - 10.1109/LCOMM.2006.1633341 ID - Cui2006 ER - TY - JOUR AU - Chen, Z. AU - Yeo, C. K. AU - Lee, B. S. AU - Lau, C. T. PY - 2018 DA - 2018// TI - Power spectrum entropy based detection and mitigation of low-rate dos attacks JO - Comput Netw VL - 136 UR - https://doi.org/10.1016/j.comnet.2018.02.029 DO - 10.1016/j.comnet.2018.02.029 ID - Chen2018 ER - TY - JOUR AU - Wu, Z. AU - Zhang, L. AU - Yue, M. PY - 2015 DA - 2015// TI - Low-rate dos attacks detection based on network multifractal JO - IEEE Trans Dependable Secure Comput VL - 13 UR - https://doi.org/10.1109/TDSC.2015.2443807 DO - 10.1109/TDSC.2015.2443807 ID - Wu2015 ER - TY - JOUR AU - Zhan, S. AU - Tang, D. AU - Man, J. AU - Dai, R. AU - Wang, X. PY - 2020 DA - 2020// TI - Low-rate dos attacks detection based on maf-adm JO - Sensors VL - 20 UR - https://doi.org/10.3390/s20010189 DO - 10.3390/s20010189 ID - Zhan2020 ER - TY - STD TI - Tang D, Dai R, Tang L, Zhan S, Man J (2018) Low-rate dos attack detection based on two-step cluster analysis. In: International conference on information and communications security, Springer, pp 92–104 ID - ref21 ER - TY - STD TI - Fontugne R, Borgnat P, Abry P, Fukuda K (2010) Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In: Proceedings of the 6th international conference, ACM, p 8 ID - ref22 ER - TY - JOUR AU - Şimşek, M. AU - Şentürk, A. PY - 2018 DA - 2018// TI - Fast and lightweight detection and filtering method for low-rate tcp targeted distributed denial of service (lddos) attacks JO - Int J Commun Syst VL - 31 UR - https://doi.org/10.1002/dac.3823 DO - 10.1002/dac.3823 ID - Şimşek2018 ER - TY - JOUR AU - Cambiaso, E. AU - Chiola, G. AU - Aiello, M. PY - 2019 DA - 2019// TI - Introducing the slowdrop attack JO - Comput Netw VL - 150 UR - https://doi.org/10.1016/j.comnet.2019.01.007 DO - 10.1016/j.comnet.2019.01.007 ID - Cambiaso2019 ER - TY - JOUR AU - Yue, M. AU - Wu, Z. AU - Wang, J. PY - 2019 DA - 2019// TI - Detecting ldos attack bursts based on queue distribution JO - IET Inf Secur VL - 13 UR - https://doi.org/10.1049/iet-ifs.2018.5097 DO - 10.1049/iet-ifs.2018.5097 ID - Yue2019 ER - TY - JOUR AU - Wu, Z. AU - Pan, Q. AU - Yue, M. AU - Liu, L. PY - 2019 DA - 2019// TI - Sequence alignment detection of tcp-targeted synchronous low-rate dos attacks JO - Comput Netw VL - 152 UR - https://doi.org/10.1016/j.comnet.2019.01.031 DO - 10.1016/j.comnet.2019.01.031 ID - Wu2019 ER - TY - JOUR AU - Yue, M. AU - Liu, L. AU - Wu, Z. AU - Wang, M. PY - 2018 DA - 2018// TI - Identifying ldos attack traffic based on wavelet energy spectrum and combined neural network JO - Int J Commun Syst VL - 31 UR - https://doi.org/10.1002/dac.3449 DO - 10.1002/dac.3449 ID - Yue2018 ER - TY - JOUR AU - Sun, H. AU - Lui, J. C. AU - Yau, D. K. PY - 2006 DA - 2006// TI - Distributed mechanism in detecting and defending against the low-rate tcp attack JO - Comput Netw VL - 50 UR - https://doi.org/10.1016/j.comnet.2005.09.016 DO - 10.1016/j.comnet.2005.09.016 ID - Sun2006 ER - TY - STD TI - Cao Y, Han L, Zhao X, Pan X (2019) Accflow: Defending against the low-rate tcp dos attack in wireless sensor networks. arXiv preprint arXiv:1903.06394 UR - http://arxiv.org/abs/1903.06394 ID - ref29 ER - TY - JOUR AU - Zhang, X. AU - Wu, Z. AU - Chen, J. AU - Yue, M. PY - 2017 DA - 2017// TI - An adaptive kpca approach for detecting ldos attack JO - Int J Commun Syst VL - 30 UR - https://doi.org/10.1002/dac.2993 DO - 10.1002/dac.2993 ID - Zhang2017 ER - TY - STD TI - Wu X, Tang D, Tang L, Man J, Zhan S, Liu Q (2018) A low-rate dos attack detection method based on hilbert spectrum and correlation. In: 2018 IEEE smartworld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), IEEE, pp 1358–1363 ID - ref31 ER - TY - JOUR AU - Agrawal, N. AU - Tapaswi, S. PY - 2018 DA - 2018// TI - Low rate cloud ddos attack defense method based on power spectral density analysis JO - Inf Process Lett VL - 138 UR - https://doi.org/10.1016/j.ipl.2018.06.001 DO - 10.1016/j.ipl.2018.06.001 ID - Agrawal2018 ER - TY - JOUR AU - Chen, H. AU - Meng, C. AU - Shan, Z. AU - Fu, Z. AU - Bhargava, B. K. PY - 2019 DA - 2019// TI - A novel low-rate denial of service attack detection approach in zigbee wireless sensor network by combining hilbert-huang transformation and trust evaluation JO - IEEE Access VL - 7 UR - https://doi.org/10.1109/ACCESS.2019.2903816 DO - 10.1109/ACCESS.2019.2903816 ID - Chen2019 ER - TY - STD TI - Yan Y, Tang D, Zhan S, Dai R, Chen J, Zhu N (2019) Low-rate dos attack detection based on improved logistic regression. In: 2019 IEEE 21st international conference on high performance computing and communications; IEEE 17th international conference on smart city; IEEE 5th international conference on data science and systems (HPCC/SmartCity/DSS), IEEE, pp 468–476 ID - ref34 ER - TY - STD TI - Zhang D, Tang D, Tang L, Dai R, Chen J, Zhu N (2019) Pca-svm-based approach of detecting low-rate dos attack. In: 2019 IEEE 21st international conference on high performance computing and communications; IEEE 17th international conference on smart city; IEEE 5th international conference on data science and systems (HPCC/SmartCity/DSS), IEEE, pp 1163–1170 ID - ref35 ER - TY - JOUR AU - Tang, D. AU - Tang, L. AU - Dai, R. AU - Chen, J. AU - Li, X. AU - Rodrigues, J. J. PY - 2020 DA - 2020// TI - Mf-adaboost: Ldos attack detection based on multi-features and improved adaboost JO - Future Gener Comput Syst UR - https://doi.org/10.1016/j.future.2019.12.034 DO - 10.1016/j.future.2019.12.034 ID - Tang2020 ER - TY - JOUR AU - He, Y. -. X. AU - Cao, Q. AU - Liu, T. AU - Han, Y. AU - Xiong, Q. PY - 2009 DA - 2009// TI - A low-rate dos detection method based on feature extraction using wavelet transform JO - J Softw VL - 20 ID - He2009 ER - TY - STD TI - Zhang T, Ramakrishnan R, Livny M (1996) Birch: an efficient data clustering method for very large databases. In: ACM sigmod record, vol 25. ACM, pp 103–114 ID - ref38 ER - TY - STD TI - Chen Y, Hwang K, Kwok Y-K (2005) Filtering of shrew ddos attacks in frequency domain. In: The IEEE conference on local computer networks 30th anniversary (LCN’05) L, IEEE, p 8 ID - ref39 ER - TY - JOUR AU - Zhang, X. AU - Wu, Z. AU - Zhang, J. AU - Chen, J. PY - 2018 DA - 2018// TI - An adaptive network traffic prediction approach for ldos attacks detection JO - Int J Commun Syst VL - 31 UR - https://doi.org/10.1002/dac.3505 DO - 10.1002/dac.3505 ID - Zhang2018 ER -