@incollection{, 330D42EDFA73C9CC8B01FFA741AB5D7F , author={{K.MunivaraPrasad} and {JNTUH}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1471532 } @incollection{b0, , title={{Survey of network-based defense mechanisms countering the DoS and DDoS problems}} , author={{ TPeng } and { CLeckie } and { KRmrao }} , journal={{ACM Computing Survey}} 39 , year={2007} } @incollection{b1, , title={{Anomaly detection: A survey}} , author={{ VChandola } and { ABanerjee } and { VKumar }} 15:1-15:58. , journal={{ACM Computing Survey}} 41 , year={2009} } @incollection{b2, , title={{Protection against denial of service attacks: A survey}} , author={{ GLoukas } and { ¨gOke }} 1020-1037. , journal={{Computer. Journal}} 53 , year={2010} } @incollection{b3, , title={{Surveying port scans and their detection methodologies}} , author={{ MHBhuyan } and { DKBhattacharyya } and { JKKalita }} , journal={{Computer. Journal}} 54 , year={Pages-1565-1581. ,(2011} } @incollection{b4, , title={{A DDoS attack detection mechanism based on protocol specific traffic features}} , author={{ HJKashyap } and { DKBhattacharyya }} , booktitle={{Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology}} the Second International Conference on Computational Science, Engineering and Information TechnologyCoimbatore, India , publisher={ACM} , year={26-28 October. 2012} } @book{b5, , title={{A survey on solutions to distributed denial of service attacks}} , author={{ SLin } and { TCChiueh }} TR201 , year={2006} Department of Computer Science, State University of New York, Stony Brook. , note={Technical Report} } @incollection{b6, , title={{Distributed Denial of Service, Tribe Flood Network 2000, and Stacheldraht CIAC-2319}} , author={{ PJCriscuolo }} ID-136939 , journal={{Rev}} 1 , year={February 14, 2000} Department of Energy Computer Incident Advisory Capability (CIAC ; Lawrence Livermore National Laboratory } @incollection{b7, , title={{A taxonomy of DDoS attack and DDoS defense mechanisms}} , author={{ JMirkovic } and { PReiher }} , journal={{ACM SIGCOMM Computer Communications Review}} 34 2 , year={April 2004} } @incollection{b8, , title={{DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection}} , author={{ SRanjan } and { .R MSwaminathan } and { KnightlyE }} , booktitle={{IEEE INFOCOM'06}} , year={2006} } @incollection{b9, , title={{Defending against flooding-based distributed denial of service attacks: A tutorial}} , author={{ RK CChang }} , journal={{Computer Journal. IEEE Communication Magazine}} 40 10 , year={2002} } @book{b10, , title={{Bots and Botnet -an overview}} , author={{ Puri }} , year={Aug. 08, 2003} } @book{b11, , title={{Distributed Denial of Service Attacks}} , author={{ BTodd }} , year={Feb. 18, 2000} } @book{b12, , title={{Denial of Service Attacks}} , year={June 4, 2001} CERT } @incollection{b13, , title={{Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures}} , author={{ XiaoJ YLiu } and { KGhaboosi } and { .HDeng } and { JZhang }} ID 692654 , journal={{EURASIP Journal. Wireless Communications and Networking}} 11 , year={2009. 2009} } @incollection{b14, , title={{Discrimination of Flash crowd attacks from DDoS attacks on internet threat monitoring (ITM) using Entropy variations}} , author={{ DrK Munivara Prasad } and { Dr K VenugopalRama Mohan Reddy } and { Rao }} , journal={{IEEE African Journal of Computing & ICT}} 6 2 , year={June 2013} } @book{b15, , author={{ DrK Munivara Prasad } and { Rama Mohan Reddy }} , title={{IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Honeypots , International journal of Network Security & Its Applications (IJNSA)}} , year={Jan 2012} 4 } @incollection{b16, , title={{Low-rate DDoS attacks detection and traceback by using new information metrics}} , author={{ YXiang } and { KLi } and { Zhou }} , journal={{IEEE Transaction on Information Forensics}} 6 , year={2011} } @incollection{b17, , title={{DDoS "detection and traceback with decision tree and grey relational analysis}} , author={{ YWu } and { ,Tseng } and { HRYang } and { W } and { Jan } and { RH }} , journal={{International Journal of Ad Hoc and Ubiquitous Computing}} 7 , year={2011} } @incollection{b18, , title={{Distributed change-point detection of DDoS attacks over multiple network domains}} , author={{ YChen } and { ,Hwang } and { WSKu }} , booktitle={{Proceedings of the IEEE International Symposium on Collaborative Technologies and Systems}} the IEEE International Symposium on Collaborative Technologies and SystemsLas Vegas, NV } @incollection{b19, , title={{}} , author={{ May }} , journal={{IEEE CS}} , year={2006} } @incollection{b20, , title={{Attacking DDoS at the source}} , author={{ JMirkoviac } and { GPrier } and { PReiher }} , booktitle={{Proceedings of the 10th IEEE International Conference on Network Protocols}} the 10th IEEE International Conference on Network ProtocolsParis, France , publisher={IEEE CS} , year={November. 2002} } @book{b21, , title={{Defending against distributed denial-of-service attacks with weight-fair router throttling}} , author={{ AMSaifullah }} 2009-7 , year={2009} , address={St. Louis, USA} Computer Science and Engineering, Washington University , note={Technical Report} } @incollection{b22, , title={{Detecting distributed denial of service attacks using source IP address" monitoring}} , author={{ TPeng } and { CLeckie } and { KRao }} , booktitle={{Proceedings of the 3rd International IFIP-TC6 Networking Conference}} the 3rd International IFIP-TC6 Networking ConferenceAthens, Greece , publisher={Springerverlag} , year={May. 2004} } @incollection{b23, , title={{DDoS attack detection method based on linear prediction model}} , author={{ JCheng } and { Yin } and { JWu } and { CZhang } and { YLi }} , booktitle={{Proceedings of the 5th international conference on Emerging intelligent computing technology and applications}} the 5th international conference on Emerging intelligent computing technology and applicationsUlsan, South Korea , publisher={Springer-Verlag} , year={16-19 September. 2009} } @incollection{b24, , title={{Statistical segregation method to minimize the false detections during DDoS attacks}} , author={{ JUdhayan } and { THamsapriya }} , journal={{International Journal of Network Security}} 13 , year={2011} } @incollection{b25, , title={{A denial of service detector based on maximum likelihood detection and the random neural network}} , author={{ GOke } and { G } and { GLoukas }} , journal={{Computer. Journal}} 50 , year={2007} } @incollection{b26, , title={{LOT: A defense against IP spoofing and flooding attacks}} , author={{ YGilad } and { AHerzberg } and { A }} , journal={{ACM Transaction on Information. Systems. Se}} 15 , year={2012} } @incollection{b27, , title={{Real time DDoS detection using fuzzy estimators}} , author={{ SNShiaeles } and { VKatos } and { AKarakos } and { BKPapadopoulos }} , journal={{Computer. Security}} 31 , year={2012} } @incollection{b28, , title={{A game theoretic defence framework against DoS/ DDoS cyber-attacks}} , author={{ TSpyridopoulos } and { GKaranikas } and { TTryfonas } and { TOikonomou } and { G }} 10.1016/j.cose.2013.03.014 , journal={{Computer Security}} , year={2013} } @incollection{b29, , title={{A new detection method for distributed denial-of-service attack traffic based on statistical test}} , author={{ CLChen }} , journal={{Journal of Universal Computer Science}} 15 , year={2009} } @incollection{b30, , title={{A prediction-based detection algorithm against distributed denial-of-service attacks}} , author={{ GZhang } and { SJiang } and { GWei } and { QGuan }} , booktitle={{Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly}} the International Conference on Wireless Communications and Mobile Computing: Connecting the World WirelesslyLeipzig, Germany , publisher={ACM} , year={June. 2009} } @incollection{b31, , title={{Detecting DDoS attacks on ISP networks}} , author={{ AAkella } and { MBharambe } and { MReiter } and { SSeshan }} , booktitle={{Proceedings of the Workshop on Management and Processing of Data Streams}} the Workshop on Management and Processing of Data StreamsSan Diego, CA, 8 } @book{b32, , title={{}} , author={{ June }} , year={2003} , publisher={ACM} } @incollection{b33, , title={{Validating neural network-based online adaptive systems: A case study}} , author={{ YLiu } and { BCukic } and { Gururajan } and { S }} , journal={{Software Quality. Jounal}} 15 , year={2007} } @incollection{b34, , title={{DDoS Attack Detection Based on Neural Network}} , author={{ YLiu } and { JLi } and { LGu }} , booktitle={{Proceedings of IEEE 2nd International Symposium on Aware Computing (ISAC)}} IEEE 2nd International Symposium on Aware Computing (ISAC) , year={2010} } @incollection{b35, , title={{Estimating Strength of a DDoS Attack in Real Time Using ANN Based Scheme}} , author={{ PKAgarwal } and { BGupta } and { SJain } and { MKPattanshetti }} , journal={{Communications in Computer and Information Science}} 157 , year={2011} , publisher={Springer} } @incollection{b36, , title={{Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network}} , author={{ TChang-Lung } and { AYChang } and { MingSzu } and { H }} , booktitle={{Proceedings of IEEE 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)}} IEEE 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) , year={2010} } @incollection{b37, , title={{Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks}} , author={{ RJalili } and { FImani-Mehr } and { MAmini } and { HRShahriari }} , booktitle={{Proceedings of the International conference on information security practice and experience}} the International conference on information security practice and experienceSingapore , publisher={Springer-verlag} , year={2005. April} } @incollection{b38, , title={{A "An anomalybased method for DDoS attacks detection using rbf neural networks}} , author={{ RKarimazad } and { AFaraahi }} , booktitle={{Proceedings of the International Conference on Network and Electronics Engineering}} the International Conference on Network and Electronics EngineeringSingapore , publisher={IACSIT Press} , year={2011} } @incollection{b39, , title={{Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features}} , author={{ DGavrilis } and { Dermatas } and { E }} , booktitle={{Computer Networks and ISDN Systems}} , year={2005} 48 } @incollection{b40, , title={{DoS detection and traceback with decision tree and grey relational analysis}} , author={{ YWu } and { HRTseng } and { WYang } and { Jan } and { R }} , journal={{International Journal of Ad Hoc and Ubiquitous Computing}} 7 , year={2011} } @incollection{b41, , title={{Proactive detection of DDoS attacks utilizing k-NN classifier in an Anti-DDoS framework}} , author={{ HNguyen } and { YChoi }} , journal={{International Journal of Electrical}} 4 , year={2010} , note={Computer, and Systems Engineering} } @incollection{b42, , title={{Modelling and Counter measures of Flooding attacks to ITM using Botnet and Group Testing}} , author={{ DrK Munivara Prasad } and { Rama Mohan Reddy }} , journal={{Global journal of Computer Science and Technology}} 21 , year={Dec 2011} , publisher={GJCST} } @incollection{b43, , title={{Distributed denial of service attack detection using an ensemble of neural classifier}} , author={{ PKumar } and { SSelvakumar }} 1328-1341. , journal={{Computer Communication}} 34 , year={2011} } @incollection{b44, , title={{A neyman-pearson approach to statistical learning}} , author={{ CScott } and { RNowak }} , journal={{IEEE Transaction on Information Theory}} 51 , year={2005} } @incollection{b45, , title={{MULTOPS: a datastructure for bandwidth attack detection}} , author={{ TMGil } and { MPoletto }} , booktitle={{Proceedings of the 10th conference on USENIX Security Symposium}} the 10th conference on USENIX Security SymposiumBerkeley, CA, USA , year={August 3. 2001} 10 } @incollection{b46, , title={{Net Bouncer: Client-legitimacy-based highperformance DDoS filtering}} , author={{ RThomas } and { BMark } and { TJohnson } and { JCroall } and { UsaIeee Cs }} , booktitle={{Proceedings of the 3rd DARPA Information Survivability Conference and Exposition}} the 3rd DARPA Information Survivability Conference and ExpositionWashington, DC , year={April. 2003} } @incollection{b47, , title={{Augmented attack tree modelling of distributed denial of services and tree based attack detection method}} , author={{ JWang } and { RC WPhan } and { JNWhitley } and { DJParish }} , booktitle={{Proceedings of the 10th IEEE International Conference on Computer and Information Technology}} the 10th IEEE International Conference on Computer and Information TechnologyBradford, UK , year={29 June-1} } @book{b48, , title={{}} , author={{ July IEEE CS. }} , year={2010} } @incollection{b49, , title={{Distributed denial of service detection using TCP/IP header and traffic measurement analysis}} , author={{ LLimwiwatkul } and { ARungsawang } and { A }} , booktitle={{Proceedings of the IEEE International Symposium Communications and Information Technology}} the IEEE International Symposium Communications and Information TechnologySapporo, Japan } @incollection{b50, , title={{}} , author={{ October }} , journal={{IEEE CS}} , year={2004} } @incollection{b51, , title={{Cooperative defence against DDoS attacks}} , author={{ GZhang } and { MParashar }} , journal={{Journal of Research and Practice in Information Technology}} 38 , year={2006} } @incollection{b52, , title={{Robust and efficient detection of DDoS attacks for large-scale internet}} , author={{ DWu } and { KLu } and { JFan } and { STodorovic } and { Nucci }} , journal={{Computer Networks}} 51 , year={2007} } @incollection{b53, , title={{Net Shield: Protocol anomaly detection with datamining against DDoS attacks}} , author={{ KHwang } and { PDave } and { STanachaiwiwat }} , booktitle={{Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection}} the 6th International Symposium on Recent Advances in Intrusion DetectionPittsburgh, PA , publisher={Springer-verlag} , year={8-10 September. 2003} } @incollection{b54, , title={{An inline detection and prevention framework for distributed denial of service attacks}} , author={{ ZChen } and { ZChen } and { ADelis }} , journal={{Computer. Journal}} 50 , year={2007} } @book{b55, , title={{DDoS attack detection method using cluster analysis. Expert Systems with Applications}} , author={{ KLee } and { JKim } and { KHKwon } and { YHan } and { SKim }} , year={2008} 34 } @incollection{b56, , title={{LADS: large-scale automated DDoS detection system}} , author={{ VSekar } and { NDueld } and { OSpatscheck } and { JVan Der Merwe } and { HZhang }} , booktitle={{Proceedings of the annual conference on USENIX Annual Technical Conference}} the annual conference on USENIX Annual Technical ConferenceBoston, MA , publisher={USENIX Association} , year={30 May-3 June. 2006} } @incollection{b57, , title={{Joint entropy analysis model for DDoS attack detection}} , author={{ HRahmani } and { NSahli } and { Kammoun } and { F }} , booktitle={{Proceedings of the 5th International Conference on Information Assurance and Security}} the 5th International Conference on Information Assurance and SecurityXian, China , year={18-20 August. 2009} 02 } @incollection{b58, , title={{Low-rate DDoS attacks detection and traceback by using new information metrics}} , author={{ YXiang } and { KLi } and { WZhou }} , journal={{IEEE Transactions on Information Forensics and Security}} 6 , year={2011} } @incollection{b59, , title={{A mathematical theory of communication}} , author={{ CEShannon }} , journal={{Bell system technical journal}} 27 , year={1948} } @incollection{b60, , title={{Fire Col: A collaborative protection network for the detection of flooding DDoS attacks}} , author={{ JFrancois } and { IAib } and { RBoutaba }} 1828-1841. , journal={{IEEE/ACM Transaction on Networking}} 20 , year={2012} } @incollection{b61, , title={{An entropy based approach to detect and distinguish DDoS attacks from flash crowds in VoIP networks}} , author={{ NJeyanthi } and { NC S NIyengar }} , journal={{International Journal of Network Security}} 14 , year={2012} } @incollection{b62, , title={{A new approach for detecting DDoS attacks based on wavelet analysis}} , author={{ MLi } and { MLi }} , booktitle={{Proceedings of the 2nd International Congress on Image and Signal Processing}} the 2nd International Congress on Image and Signal ProcessingTianjin, China } @incollection{b63, , title={{}} , author={{ October }} , journal={{IEEE}} , year={2009} } @incollection{b64, , title={{DDoS detection system based on data mining}} , author={{ RZhong } and { GYue }} , booktitle={{Proceedings of the 2nd International Symposium on Networking and Network Security}} the 2nd International Symposium on Networking and Network SecurityJinggangshan, China , publisher={Academy Publisher} , year={2-4 April. 2010} } @incollection{b65, , title={{Fast algorithms for mining association rules in large databases}} , author={{ RAgrawal } and { RSrikant }} , booktitle={{Proceedings of the 20th International Conference on Very Large Data Bases}} the 20th International Conference on Very Large Data BasesSantiago de Chile, Chile , publisher={Morgan Kaufmann} , year={September. 1994} } @incollection{b66, , title={{A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters}} , author={{ JCDunn }} , journal={{Journal of Cybernetics}} 3 , year={1973} } @incollection{b67, , title={{A cascade architecture for DoS attacks detection based on the wavelet transform}} , author={{ ADainotti } and { APescap´e } and { GVentre }} , journal={{Journal of Computer Security}} 17 , year={2009} } @incollection{b68, , title={{Zur "Theoriederorthogonalen Funktionensysteme}} , author={{ AHaar } and { A }} , journal={{Mathematische Annalen}} 69 , year={1910} } @incollection{b69, , title={{DDoS attack detection and wavelets}} , author={{ LLi } and { GLee }} , booktitle={{Proceedings. of the 12th International Conference on Computer Communications and Networks}} of the 12th International Conference on Computer Communications and NetworksDallas, Texas, USA , publisher={IEEE} , year={October 20-22. 2003} } @incollection{b70, , title={{ANN based scheme to predict number of zombies in DDoS attack}} , author={{ BBGupta } and { RCJoshi } and { MMisra }} , journal={{International Journal of Network Security}} 14 , year={2012} } @incollection{b71, , title={{A new way to detect DDoS attacks within single router}} , author={{ RYan } and { QZheng } and { GNiu } and { SGao }} , booktitle={{Proceedings of the 11th IEEE Singapore International Conference on Communication Systems}} the 11th IEEE Singapore International Conference on Communication SystemsGuangzhou, China , year={19-21 November. 2008} } @incollection{b72, , title={{DDoS attack detection using IP address feature interaction}} , author={{ JCheng } and { JYin } and { YLiu } and { ZCai } and { CWu }} , booktitle={{Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems}} the 1st International Conference on Intelligent Networking and Collaborative SystemsBarcelona, Spain } @incollection{b73, , title={{}} , author={{ November }} , journal={{IEEE CS}} , year={2009} } @incollection{b74, , title={{Enhancing DDoS flood attack detection via intelligent fuzzy logic}} , author={{ ZXia } and { SLu } and { JLi } and { JTang }} pages-497-507. , journal={{Informatics (Slovenia)}} 34 , year={2010} } @book{b75, , title={{Flow level detection and filtering of low-rate DDoS. Computer Networks}} , author={{ CZhang } and { ZCai } and { WChen } and { XLuo } and { Yin } and { J }} , year={2012} 56 } @book{b76, , title={{Botnet detection based on traffic behaviour analysis and flow intervals}} , author={{ DZhao } and { ITraore } and { BSayed } and { WLu } and { SSaad } and { AGhorbani } and { DGarant }} 10.1016/j.cose.2013.04.007 , year={2013} Computer Security } @incollection{b77, , title={{DDoS Attacks Defense System Using Information Metrics}} , author={{ PCSenthil Mahesh } and { SHemalatha } and { PRodrigues } and { AShanthakumari }} , booktitle={{Proceedings of 3rd International Conference on Trends in Information, Telecommunication and Computing}} , booktitle={{Lecture Notes in Electrical Engineering}} 3rd International Conference on Trends in Information, Telecommunication and ComputingNew York , publisher={Springer} , year={2012} } @incollection{b78, , title={{A self-aware approach to denial of service defence}} , author={{ EGelenbe } and { GLoukas }} , journal={{Computer Networks}} 51 , year={2007} } @incollection{b79, , title={{Traceback Techniques Against DDoS Attacks: A Comprehensive Review}} , author={{ KKumar } and { ALSangal } and { ABhandari }} , booktitle={{Proceedings of IEEE 2nd International Conference on Computer and Communication Technology (ICCCT)}} IEEE 2nd International Conference on Computer and Communication Technology (ICCCT) , year={2011} } @incollection{b80, , title={{Traceback of DDoS Attacks Using Entropy Variations}} , author={{ SYu } and { WZhou } and { RDoss } and { WJia }} , journal={{IEEE Transactions on Parall. Distr}} 22 , year={2011} } @incollection{b81, , title={{Low-rate DDoS attacks detection and traceback by using new information metrics}} , author={{ YXiang } and { KLi } and { WZhou }} , journal={{IEEE T Inf. Foren. Sec}} 6 , year={2011} } @incollection{b82, , title={{Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues}} , author={{ HFLipson }} Report: CMU/SEI-2002-SR-009 , journal={{CERT Coordination Center}} , year={2002} } @incollection{b83, , title={{Tracing sources of DDoS attacks in IP networks using machine learning automatic defence system}} , author={{ KSubhashini } and { GSubbalakshmi }} , journal={{International. Journal. Electron. Commun. Comput. Eng}} 3 , year={2012} }