• 1
    Ben-Porat U, Bremler-Barr A, Levy H. Vulnerability of network mechanisms to sophisticated DDoS attacks. IEEE Transactions on Computers 2013; 62(5):10311043.
  • 2
    Zhang F, Papatriantafilou M, Tsigas P. Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts. IEEE Transactions on Dependable and Secure Computing 2012; 9:401413.
  • 3
    fMirkovic J, Reiher P. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication 2004; 34:3953.
  • 4
    Chonka A, Singh J, Zhou WL. Chaos theory based detection against network mimicking DDoS attacks. IEEE Communications Letters 2009; 13:717719.
  • 5
    Garber L. Denial-of-service attacks rip the Internet. IEEE Computer 2000; 33:1217.
  • 6
    Yuan Y, Mills K. Monitoring the macroscopic effect of DDoS flooding attacks. IEEE Transactions on Dependable and Secure Computing 2005; 2:324335.
  • 7
    Huang H, Ahmed N, Karthik P. On a new type of denial of service attack in wireless networks: the distributed jammer network. IEEE Transactions on Wireless Communications 2011; 10:23162324.
  • 8
    Tan Y, Sengupta S, Subbalakshmi KP. Analysis of coordinated denial-of-service attacks in IEEE 802.22 networks. IEEE Journal on Selected Areas in Communications 2011; 29:890902.
  • 9
    Kim N, Lim H, Park H, Kang M. Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency. IEEE Communications Letters 2010; 14:11701172.
  • 10
    Ye N, Li X-Y, Chen Q, Emran SM, Xu M-M. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Transactions on System, Man, and Cybernetics 2001; 31:266274.
  • 11
    Kim SS, Reddy ALN. Statistical techniques for detecting traffic anomalies through packet header data. IEEE/ACM Transactions on Networking 2008; 16:562575.
  • 12
    Xiang Y, Zhou W-L, Guo M-Y. Flexible deterministic packet marking: an IP traceback system to find the real source of attacks. IEEE Transaction on Parallel and Distributed Systems 2009; 20:567580.
  • 13
    Xie Y, Yu S-Z. Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Transactions on Networking 2009; 17:1525.
  • 14
    Xie Y, Yu S-Z. A large-scale Hidden Semi-Markov Model for anomaly detection on user browsing behaviours. IEEE/ACM Transactions on Networking 2009; 17:5465.
  • 15
    Xiang Y, Lin Y, Lei WL, Huang SJ. Detecting DDOS attack based on network self-similarity. IEE Proceedings Communications 2004; 151:292295.
  • 16
    Leland WE, Taqqu MS, Willinger W, Wilson DV. On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking 1994; 2:115.
  • 17
    Paxson V. The Internet traffic archive. [Online]. Available:
  • 18
    MIT Lincoln laboratory DARPA intrusion detection evaluation data sets.
  • 19
    Shi ML, Qian J, Xu C. Research of intrusion detection system dataset evaluation. Computer Science 2006; 33:18.
  • 20
    Kong J, Mirze M, Shu J, Yoedhana C, Gerla M, Lu S. Random flow network modelling and simulations for DDoS attack mitigation. Presented at the International Conference on Communications, 2003.
  • 21
    Gao Z-Q, Ansari N. Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests. IEEE Communications Letters 2006; 10:793795.
  • 22
    Oliveira C, Bae KJ, Suda T. Long-range dependence in IEEE 802.11b wireless Lan traffic: an empirical study. Presented at the 18th Annual Workshop on Computer Communications (CCW'2003), 2003.
  • 23
    Allen WH, Marin GA. The LoSS technique for detecting new denial of service attacks. Presented at the IEEE Southeast Conference, 2004.
  • 24
    Leland WE, Taqqu MS, Willinger W. On the self-similar nature of Ethernet traffic (extended version). IEEE/ACM Transactions on Networking 1994; 2:115.
  • 25
    Anthony M, Bartlett PL. Neural Networking Learning: Theoretical Foundations (1st edn). Cambridge University Press, Cambridge, UK, 2009.