Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Denial-of-service attack-detection techniques
by
Kesidis, G.
, Carl, G.
, Brooks, R.R.
, Suresh Rai
in
Computation
/ Computer crime
/ Computer security
/ denial-of-service
/ Detectors
/ DoS
/ Event detection
/ Face detection
/ Flooding
/ flooding attacks
/ Floods
/ Frequency estimation
/ Internet
/ Networks
/ Operators
/ Power system security
/ Profiling
/ Protocols
/ Signal analysis
/ Testing
2006
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Denial-of-service attack-detection techniques
by
Kesidis, G.
, Carl, G.
, Brooks, R.R.
, Suresh Rai
in
Computation
/ Computer crime
/ Computer security
/ denial-of-service
/ Detectors
/ DoS
/ Event detection
/ Face detection
/ Flooding
/ flooding attacks
/ Floods
/ Frequency estimation
/ Internet
/ Networks
/ Operators
/ Power system security
/ Profiling
/ Protocols
/ Signal analysis
/ Testing
2006
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Denial-of-service attack-detection techniques
by
Kesidis, G.
, Carl, G.
, Brooks, R.R.
, Suresh Rai
in
Computation
/ Computer crime
/ Computer security
/ denial-of-service
/ Detectors
/ DoS
/ Event detection
/ Face detection
/ Flooding
/ flooding attacks
/ Floods
/ Frequency estimation
/ Internet
/ Networks
/ Operators
/ Power system security
/ Profiling
/ Protocols
/ Signal analysis
/ Testing
2006
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Denial-of-service attack-detection techniques
2006
Request Book From Autostore
and Choose the Collection Method
Overview
Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal analysis - face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques and testing results provides insight into our ability to successfully identify DoS flooding attacks. Although each detector shows promise in limited testing, none completely solve the detection problem. Combining various approaches with experienced network operators most likely produce the best results.
Publisher
IEEE,IEEE Computer Society
Subject
This website uses cookies to ensure you get the best experience on our website.