Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Watts, S. Strogatz (1998)
Collective dynamics of ‘small-world’ networksNature, 393
Zesheng Chen, C. Ji (2008)
An Information-Theoretic View of Network-Aware Malware AttacksIEEE Transactions on Information Forensics and Security, 4
Shui Yu, Wanlei Zhou, W. Jia, Song Guo, Yong Xiang, F. Tang (2012)
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation CoefficientIEEE Transactions on Parallel and Distributed Systems, 23
Chia Cho, Juan Caballero, Chris Grier, V. Paxson, D. Song (2010)
Insights from the Inside: A View of Botnet Management from Infiltration
Shui Yu, Wanlei Zhou, R. Doss (2008)
Information theory based detection against network behavior mimicking DDoS attacksIEEE Communications Letters, 12
L. Breslau, P. Cao, Li Fan, Graham Phillips, S. Shenker (1999)
Web caching and Zipf-like distributions: evidence and implicationsIEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1
V. Gligor (1984)
A Note on Denial-of-Service in Operating SystemsIEEE Transactions on Software Engineering, SE-10
Shui Yu, Wanlei Zhou, R. Doss, W. Jia (2011)
Traceback of DDoS Attacks Using Entropy VariationsIEEE Transactions on Parallel and Distributed Systems, 22
Brett Stone-Gross, M. Cova, L. Cavallaro, Bob Gilbert, M. Szydlowski, R. Kemmerer, Christopher Krügel, G. Vigna (2009)
Your botnet is my botnet: analysis of a botnet takeover
Haifeng Yu, M. Kaminsky, Phillip Gibbons, A. Flaxman (2008)
SybilGuard: defending against sybil attacks via social networksIEEE ACM Transactions on Networking, 16
Basheer Al-Duwairi, M. Govindarasu (2006)
Novel hybrid schemes employing packet marking and logging for IP tracebackIEEE Transactions on Parallel and Distributed Systems, 17
Yinglian Xie, Fang Yu, Kannan Achan, R. Panigrahy, Geoff Hulten, Ivan Osipkov (2008)
Spamming botnets: signatures and characteristics
D. McGrath, Minaxi Gupta (2008)
Behind Phishing: An Examination of Phisher Modi Operandi
V. D. Gligor (1984)
320IEEE Transactions on Software Engineering, 10
M. Sqalli, F. Al-Haidari, K. Salah (2011)
EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing2011 Fourth IEEE International Conference on Utility and Cloud Computing
Rui-ping Lua, K. Yow (2011)
Mitigating DDoS attacks with transparent and intelligent fast-flux swarm networkIEEE Network, 25
Justin Ma, L. Saul, S. Savage, G. Voelker (2009)
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
D. Moore, G. Voelker, S. Savage (2001)
Inferring Internet denial-of-service activityACM Trans. Comput. Syst., 24
Derek Greene, P. Cunningham, Rudolf Mayer (2008)
Unsupervised Learning and Clustering
Alfonso Valdes (1982)
SRI International
Haifeng Yu, Chenwei Shi, M. Kaminsky, Phillip Gibbons, Feng Xiao (2009)
DSybil: Optimal Sybil-Resistance for Recommendation Systems2009 30th IEEE Symposium on Security and Privacy
G. Gu, Phillip Porras, V. Yegneswaran, Martin Fong, Wenke Lee (2007)
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
M. Coates, A. Hero, R. Nowak, Bing Yu (2002)
Internet tomographyIEEE Signal Process. Mag., 19
Wei Yu, K. Liu (2008)
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic ApproachIEEE Transactions on Information Forensics and Security, 3
M. Crovella, Azer Bestavros (1997)
Self-similarity in World Wide Web traffic: evidence and possible causesIEEE ACM Transactions on Networking, 5
M. Goodrich (2008)
Probabilistic Packet Marking for Large-Scale IP TracebackIEEE/ACM Transactions on Networking, 16
P. Mieghem, Jasmina Omic, R. Kooij (2009)
Virus Spread in NetworksIEEE/ACM Transactions on Networking, 17
Nan Jiang, Jin Cao, Yu Jin, Erran Li, Zhi-Li Zhang (2010)
Identifying suspicious activities through DNS failure graph analysisThe 18th IEEE International Conference on Network Protocols
C. Zou, W. Gong, D. Towsley, Lixin Gao (2005)
The monitoring and early detection of Internet wormsIEEE/ACM Transactions on Networking, 13
Michael Bailey, Evan Cooke, F. Jahanian, Yunjing Xu, M. Karir (2009)
A Survey of Botnet Technology and Defenses2009 Cybersecurity Applications & Technology Conference for Homeland Security
Tao Peng, C. Leckie, K. Ramamohanarao (2007)
Survey of network-based defense mechanisms countering the DoS and DDoS problemsACM Comput. Surv., 39
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi
Joseph Idziorek, Mark Tannian, D. Jacobson (2013)
The Insecurity of Cloud Utility ModelsIT Professional, 15
M. Rajab, J. Zarfoss, F. Monrose, A. Terzis (2007)
My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging
Andrey Belenky, N. Ansari (2003)
IP traceback with deterministic packet markingIEEE Communications Letters, 7
Gitta Kutyniok (2014)
Compressed Sensing
Y. Xiang, Wanlei Zhou, M. Guo (2009)
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of AttacksIEEE Transactions on Parallel and Distributed Systems, 20
G. Gu, R. Perdisci, Junjie Zhang, Wenke Lee (2008)
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Zhao, Yafei Dai (2011)
Uncovering social network sybils in the wild
Wei Yu, Xun Wang, Xinwen Fu, D. Xuan, Wei Zhao (2009)
An Invisible Localization Attack to Internet Threat MonitorsIEEE Transactions on Parallel and Distributed Systems, 20
R. Perdisci, I. Corona, D. Dagon, Wenke Lee (2009)
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces2009 Annual Computer Security Applications Conference
D. Dagon, C. Zou, Wenke Lee (2006)
Modeling Botnet Propagation Using Time Zones
Christopher Yang (2008)
Information sharing and privacy protection of terrorist or criminal social networks2008 IEEE International Conference on Intelligence and Security Informatics
R. Albert, A. Barabási (2001)
Statistical mechanics of complex networksArXiv, cond-mat/0106096
B. McInnes, Jannene McBride, N. Evans, David Lambert, A. Andrew (1999)
Emergence of Scaling in Random Networks
V. Thing, M. Sloman, Naranker Dulay (2007)
A Survey of Bots Used for Distributed Denial of Service Attacks
Ling Huang, X. Nguyen, M. Garofalakis, J. Hellerstein, Michael Jordan, A. Joseph, N. Taft (2007)
Communication-Efficient Online Detection of Network-Wide AnomaliesIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
[In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve the challenges.]
Published: Oct 15, 2013
Keywords: Malicious Node; Malicious Activity; Social Network Technology; Attack Tool; Attack Source
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.