@incollection{, 6FE28FB3FFBEC6F146621D3AAC5D6A6D , author={{Dr. Koppula SrinivasRao} and {Sumathi RaniManukonda} and {}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1562125 } @incollection{b0, , title={{A Taxonomy of DDoS Attack and DDoS Defense Mechanisms}} , author={{ JMirkovic } and { PReiher }} , journal={{ACM SIGCOMM Computer Communications Review}} 34 2 , year={April 2004} } @incollection{b1, , title={{DDoS Detection System Based on Data Mining}} , author={{ RuiZhong } and { GuangxueYue ; Jinggangshan } and { PRChina }} , booktitle={{) Proceedings of the Second International Symposium on Networking and Network Security (ISNNS '10)}} , year={2-4, April.2010} , note={Print} } @incollection{b2, , title={{Spooling prevention method}} , author={{ HBremler-Barr } and { Levy }} , booktitle={{Proc. IEEE INFOCOM}} , editor={ JBrutlag } IEEE INFOCOMMiami, FL , year={March 2005} } @incollection{b3, , title={{Aberrant Behavior Detection in Time Series for Network Monitoring}} , booktitle={{Proc. of USENIX LISA}} of USENIX LISA , year={2000} } @incollection{b4, , title={{Application of anomaly detection algorithms for detecting syn flooding attacks}} , author={{ CSiris } and { FPapagalou }} , booktitle={{Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '04)}} IEEE Global Telecommunications Conference (GLOBECOM '04)Dallas, USA , year={2004} 4 } @incollection{b5, , title={{DDoS attacks and defense mechanisms: classification and state ofthe-art}} , author={{ ADouligeris } and { Mitrokotsa }} , journal={{Computer Networks}} 44 5 , year={2004} } @incollection{b6, , title={{Network Anomaly Detection Based on Statistical Approach and Time Series Analysis}} , author={{ HuangKai } and { QiZhengwei } and { LiuBo }} , booktitle={{International Conference on Advanced Information Networking and Applications Workshops}} , year={2009} } @incollection{b7, , title={{An efficient online anomalies detection mechanism for highspeed networks}} , author={{ OSalem } and { SVaton } and { AGravey }} , booktitle={{IEEE Workshop on Monitoring, Attack Detection and Migitation}} , year={MonAM 2007. November 2007} } @incollection{b8, , title={{Analyzing distributed denial of service attack tools: The shaft case}} , author={{ SDietrich } and { NLong } and { DDittrich }} , booktitle={{Proceedings of 14th Systems Administration Conference}} 14th Systems Administration ConferenceNew Orleans, Louisiana, USA , year={2000} } @incollection{b9, , title={{Real Time Data Mining-based Intrusion Detection}} , author={{ WenkeLee } and { SalvatoreJStolfo } and { PhilipKChan Eleazar Eskin } and { WeiFan } and { ShlomoMatthewmiller } and { JunxinHershkop } and { Zhang }} , booktitle={{ieexlore. ieee.org}} , year={2002} }