최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기ETRI journal, v.44 no.2, 2022년, pp.346 - 354
Sun, Jia-Rong (Department of Computer Science and Information Engineering, Asia University) , Huang, Chin-Tser (Department of Computer Science and Engineering, University of South Carolina) , Hwang, Min-Shiang (Department of Computer Science and Information Engineering, Asia University)
The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self-information approach for detecting the SYN flooding attack and provided a detection algorithm with a hierarchical policy ...
W. Eddy, TCP SYN flooding attacks and common mitigations, RFC 4987, Aug. 2007.
M. Hussain, J. Ren, and A. Akram, Classification of DoS attacks in wireless sensor network with artificial neural network, Int. J. Netw. Secur. 22 (2020), no. 3, 542-549.
M. Handley and E. Rescorla, IAB, internet denial-of-service considerations, RFC 4732, Nov. 2006.
Y. Zhao, W. Cui, and Y. Feng, A detection method based on behavior-path representation against application-layer DDoS attacks, Int. J. Netw. Secur. 23 (2021), no. 2, 229-237.
J. Postel, Transmission control protocol-DARPA internet program protocol specification, RFC 793, Sept. 1981.
S. Sedaghat, The forensics of DDoS attacks in the fifth generation mobile networks based on software-defined networks, Int. J. Netw. Secur. 22 (2020), no. 1, 41-53.
C. Sorrells and L. Qian, Quickest detection of denial-of-service attacks in cognitive wireless networks, Int. J. Netw. Secur. 16 (2014), no. 6, 468-476.
S. Ghanti and G. M. Naik, Defense techniques of SYN flood attack characterization and comparisons, Int. J. Netw. Secur. 20 (2018), no. 4, 721-729.
M. Geva, A. Herzberg, and Y. Gev, Bandwidth distributed denial of service: Attacks and defenses, IEEE Secur. Priv. 1 (2014), 54-61.
B. Mihajlov and M. Bogdanoski, Analysis of the WSN MAC protocols under jamming DoS attack, Int. J. Netw. Secur. 16 (2014), no. 4, 304-312.
C. Callegari, S. Giordano, and M. Pagano, Entropy-based network anomaly detection, in Proc. Int. Conf. Comput., Netw. Commun. (Silicon Valley, CA, USA), Jan. 2017.
A. A. Waskita, H. Suhartanto, and L. T. Handoko, A performance study of anomaly detection using entropy method, in Proc. Int. Conf. Comput., Contr., Inf. Its. Appl. (Tangerang, Indonesia), Oct. 2016.
S. K. Gautam and H. Om, Anomaly detection system using entropy based technique, in Proc. Int. Conf. Next Gener. Comput. Technol. (Dehradun, India), Sept. 2015.
H. Wang, D. Zhang and K. G. Shin, Detecting SYN flooding attacks, in Proc. Annu. Joint Conf. IEEE Comput. Commun. Soc. (New York, NY, USA), June 2002.
V. A. Siris and F. Papaglou, Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, in Proc. IEEE Glob. Telecommun. Conf. (Dallas, TX, USA), Nov. 2004.
J. Yu et al., Traffic Flooding Attack Detection with SNMP MIB Using SVM, Comput. Comm. 31 (2008), no. 17, 4212-4219.
H. C. Chen et al., An approach for detecting flooding attack based on integrated entropy measurement in e-mail server, in Advanced Technologies, Embedded and Multimedia for Human-centric Computing, vol. 260, Springer, Dordrecht, Netherlands, 2014, pp. 941-952.
J. Myers and M. Rose, Post office protocol-Version 3, RFC 1939, May 1996.
M. Bellaiche and J. Gregoire, SYN flooding attack detection based on entropy computing, in Proc. IEEE Glob. Telecommun. Conf. (Honolulu, HI, USA), Nov. 2009.
C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. 27 (1948no. 3, 379-423 & 623-656.
H. C. Chen et al., A New Approach for Detecting SMTPFA Based on Entropy Measurement, in Proc. IFIP Int. Conf. Netw. Parall. Comput. (Gwangju, Korea), Sept. 2012, pp. 349-359.
J. Klensin, Simple mail transfer protocol, RFC5321, Oct. 2008.
M. Crispin, Internet message access protocol-Version 4, RFC 3501, Mar. 2003.
R. Fielding et al., Hypertext transfer protocol - HTTP/1.1, RFC 2616, June 1999.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.