共 23 条
[1]
Wu ZJ, Pei BS., The detection of LDoS attack based on the model of small signal, Acta Electronica Sinica, 39, 6, pp. 1456-1460, (2011)
[2]
Luo JT, Yang XL, Wang J, Xu J, Sun J, Long KP., On a mathematical model for low-rate shrew DDoS, IEEE Trans. on Information Forensics and Security, 9, 7, pp. 1069-1083, (2014)
[3]
Kuzmanovic A, Knightly EW., Low-rate TCP-targeted denial of service attacks, Proc. of the ACM SIGCOMM, 14, 4, pp. 75-86, (2003)
[4]
Wen K, Yang JH, Zhang B., Survey on research and progress of low-rate denial of service attacks, Ruan Jian Xue Bao/Journal of Software, 25, 3, pp. 591-605, (2014)
[5]
Kwok YK, Tripathi R, Chen Y, Hwang K., HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks, Proc. of the ICCNMC, pp. 423-432, (2005)
[6]
Zhang J, Hu HP, Liu B, Xiao FT., Detecting LDoS attack based on ASPQ, Journal on Communication, 33, 5, pp. 79-84, (2012)
[7]
Wu N, Mu ZY, Zhang LC., Distributed denial of service covert flow detection based on data stream potential energy feature, Computer Engineering, 41, 3, pp. 142-146, (2015)
[8]
Luo JT, Yang XL., The new shrew attack: A new type of low-rate TCP-targeted DoS attack, Proc. of the Int’l Conf. on Communications, pp. 713-718, (2014)
[9]
Chen Y, Huang K, Kwok YK., Collaborative defense against periodic shrew DDoS attacks in frequency domain, ACM Trans. on Information and System Security, (2005)
[10]
Tang D, Chen K, Chen XS, Liu HY, Li XH., Adaptive EWMA method based on abnormal network traffic for LDoS attacks, Mathematical Problems in Engineering, 3, pp. 166-183, (2014)