咨询与建议

限定检索结果

文献类型

  • 6 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 轻工技术与工程
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 6 篇 dos/ddos detecti...
  • 4 篇 chi-square value
  • 3 篇 statistical appr...
  • 2 篇 anomaly detectio...
  • 1 篇 ipv4/ipv6 covert...
  • 1 篇 reflection
  • 1 篇 csdm method
  • 1 篇 dns
  • 1 篇 computer crime
  • 1 篇 learning time
  • 1 篇 d
  • 1 篇 feature extracti...
  • 1 篇 machine learning
  • 1 篇 entropy
  • 1 篇 probabilistic lo...
  • 1 篇 nat64
  • 1 篇 anomaly detectio...
  • 1 篇 chi-square-based...
  • 1 篇 equations
  • 1 篇 ip networks

机构

  • 2 篇 graduate school ...
  • 2 篇 ict center for l...
  • 2 篇 dep. of electron...
  • 1 篇 kumamoto natl co...
  • 1 篇 iij innovat inst...
  • 1 篇 taitung universi...
  • 1 篇 production syste...
  • 1 篇 tokai univ dep e...
  • 1 篇 univ tokyo
  • 1 篇 kumamoto univ gr...
  • 1 篇 kumamoto natl co...
  • 1 篇 tokai univ dept ...

作者

  • 4 篇 oshima shunsuke
  • 4 篇 nakashima takuo
  • 3 篇 sueyoshi toshino...
  • 1 篇 yu-tine cho
  • 1 篇 shi-yi xie
  • 1 篇 shima keiichi
  • 1 篇 ichimura yusuke
  • 1 篇 nakamura ryo
  • 1 篇 miyamoto daisuke
  • 1 篇 bo-jyun huang
  • 1 篇 bo-xian chen
  • 1 篇 sekiya yuji
  • 1 篇 okada kazuya
  • 1 篇 ishihara tomohir...
  • 1 篇 reen-cheng wang

语言

  • 6 篇 英文
检索条件"主题词=DoS/DDoS detection"
6 条 记 录,以下是1-10 订阅
排序:
Computational Complexity of Anomaly detection Methods
Computational Complexity of Anomaly Detection Methods
收藏 引用
7th International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Oshima, Shunsuke Nakashima, Takuo Kumamoto Natl Coll Technol ICT Ctr Learning Support 2627 Hirayama Shinmachi Yatsushiro Kumamoto Japan Tokai Univ Dept Elect Intelligent Syst Engn Kumamoto Japan
As the typical anomaly detection methods using statistics, entropy and chi(2) based method has been researched and reported with their performance properties for anomaly attacks. In this research, we compare the time ... 详细信息
来源: 评论
Anomaly detection using Chi-Square Values based on the Typical Features and the Time Deviation
Anomaly Detection using Chi-Square Values based on the Typic...
收藏 引用
25th IEEE International Conference on Advanced Information Networking and Applications (AINA)
作者: Oshima, Shunsuke Nakashima, Takuo Sueyoshi, Toshinori Kumamoto Natl Coll Technol ICT Ctr Learning Support 2627 Hirayama Shinmachi Kumamoto Japan Tokai Univ Dep Elect & Intelligent Syst Eng Tokai Ibaraki Japan Kumamoto Univ Grad Sch Sci & Technol Kumamoto Japan
In the research of the anomaly detection system analyzing the packet header on the Internet, previous researches have proposed the anomaly detection system using chi-square values in terms of the source IP address and... 详细信息
来源: 评论
An anomaly detection system based on chi-square method with dynamic BIN algorithm
An anomaly detection system based on chi-square method with ...
收藏 引用
6th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA-2011
作者: Oshima, Shunsuke Ichimura, Yusuke Nakashima, Takuo Sueyoshi, Toshinori ICT Center for Learning Support Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Production Systems Engineering Course Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Dep. of Electronics and Intelligent Systems Engineering Tokai University 9-1-1 Toroku Kumamoto Japan Graduate School of Science and Technology Kumamoto University 2-39-1 Kurokami Kumamoto Japan
The statistic researches have been proposed to detect anomaly attacks using chi-square. In these researches, features such as the IP address and the port number are used as the probabilistic variables. The method base... 详细信息
来源: 评论
The evaluation of an anomaly detection system based on Chi-square method
The evaluation of an anomaly detection system based on Chi-s...
收藏 引用
26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
作者: Oshima, Shunsuke Nakashima, Takuo Sueyoshi, Toshinori ICT Center for Learning Support Kumamoto National College of Technology 2627 Hirayama-Shinmachi Yatsushiro Kumamoto Japan Dep. of Electronics and Intelligent Systems Engineering Tokai University 9-1-1 Toroku Kumamoto Japan Graduate School of Science and Technology Kumamoto University 2-39-1 Kurokami Kumamoto Japan
The conventional methods using χ2 value have been proposed to detect anomaly attacks. These systems, however, merely treat the one feature such as the source IP address or the destination port number as the probabili... 详细信息
来源: 评论
Classifying DNS Servers based on Response Message Matrix using Machine Learning  6
Classifying DNS Servers based on Response Message Matrix usi...
收藏 引用
6th Annual Conference on Computational Science and Computational Intelligence (CSCI)
作者: Shima, Keiichi Nakamura, Ryo Okada, Kazuya Ishihara, Tomohiro Miyamoto, Daisuke Sekiya, Yuji IIJ Innovat Inst Inc Tokyo Japan Univ Tokyo Tokyo Japan
Improperly configured Domain Name System (DNS) servers are sometimes used as packet reflectors as part of a dos or ddos attack. Detecting packets created as a result of this activity is logically possible by monitorin... 详细信息
来源: 评论
Detecting dos/ddos Attack under IPv4/IPv6 Translation Covert Channel
Detecting DoS/DDoS Attack under IPv4/IPv6 Translation Covert...
收藏 引用
2016 2nd International Conference on Humanity and Social Science(ICHSS 2016)
作者: Reen-cheng WANG Bo-xian CHEN Bo-jyun HUANG Shi-yi XIE Yu-tine CHO Taitung University
With the IPv6 becomes more and more popular, people start to notice its security problems. The problems not only happen in the protocol itself, but also exist in the deployment scenarios. In this paper, we present our... 详细信息
来源: 评论