共 21 条
- [1] Beran J., Statistics for Long-Memory Processes, 61, (1994)
- [2] Bhuyan M.H., Bhattacharyya D.K., Kalita J.K., An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection, Pattern Recognition Letters, 51, pp. 1-7, (2015)
- [3] Bhuyan M.H., Bhattacharyya D.K., Kalita J.K., ELDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric, Security and Communication Networks, 9, 16, pp. 3251-3270, (2016)
- [4] Bonilla R.I., Abad C.L., Towards a real-time framework for monitoring IoT devices for attack detection: vision paper, Dependable, Autonomic and Secure Computing, 15th Intl. Conf. on Pervasive Intelligence & Computing, 3rd Intl. Conf. on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/ CyberSciTech), 2017 IEEE 15th Intl, pp. 699-703, (2017)
- [5] Du P., Abe S., IP packet size entropy-based scheme for detection of DoS/DDoS attacks, IEICE Transaction on Information and Systems, E91-D, 5, pp. 1274-1281, (2008)
- [6] Harkins M.W., Managing Risk and Information Security: Protect to Enable, (2016)
- [7] Jadhav P.N., Patil B.M., Low-rate DDOS attack detection using optimal objective entropy method, International Journal of Computer Applications, 78, 3, pp. 33-38, (2013)
- [8] Kreutz D., Ramos F.M., Verissimo P.E., Rothenberg C.E., Azodolmolky S., Uhlig S., Software-defined networking: a comprehensive survey, Proceedings of the IEEE, 103, 1, pp. 14-76, (2015)
- [9] Luo J., Yang X., Wang J., Xu J., Sun J., Long K., On a mathematical model for low-rate shrew DDoS, IEEE Transactions on Information Forensics and Security, 9, 7, pp. 1069-1083, (2014)
- [10] Mansfield-Devine S., The growth and evolution of DDoS, Network Security, 2015, 10, pp. 13-20, (2015)