Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016, Article ID 2579274, 5 pages
http://dx.doi.org/10.1155/2016/2579274
Research Article

An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy

1School of Information Science and Engineering, Shenyang Ligong University, Shenyang 110159, China
2College of Information Science and Engineering, Northeaster University, Shenyang 110819, China

Received 12 April 2016; Revised 24 September 2016; Accepted 29 September 2016

Academic Editor: Jun Bi

Copyright © 2016 Yuntao Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Y. Yuan, Distributed Denial of Service Attack Tracking Technology Research, Central South University, Changsha, China, 2009.
  2. S. Rajesh, “Protection from application layer DDoS attacks for popular websites,” International Journal of Computer and Electrical Engineering, vol. 5, no. 6, pp. 555–558, 2013. View at Publisher · View at Google Scholar
  3. G. Chen, DDoS Attacking Countermeasures, Xi'an University of Electronic Science and Technolog, Xi'an, China, 2005.
  4. Chapter 1: Service Oriented Architecture (SOA), May 2014, https://msdn.microsoft.com.
  5. J. Jung, B. Krishnamurthy, and M. Rabinovich, “Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites,” in Proceedings of the 11th International Conference on World Wide Web (WWW '02), pp. 293–304, Honolulu, Hawaii, USA, 2002.
  6. Y. L. Lu, Y. Zhang, and C. L. Sun, “Distributed denial rebound analysis and prevention service,” Computer Engineering, vol. 2, article 22, 2004. View at Google Scholar
  7. W. Zhou, L. N. Wang, H. G. Zhang, and J. M. Fu, “A new DDoS attacks and countermeasures,” Computer Application, vol. 1, article 144, 2003. View at Google Scholar
  8. J. Xiao, X.-C. Yun, and Y.-Z. Zhang, “Defend against application-layer distributed denial-of-service attacks based on session suspicion probability model,” Chinese Journal of Computers, vol. 33, no. 9, pp. 1713–1724, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. C. F. Yang, G. Wang, and J. H. Si, “Construction of a new generation of enterprise application integration based on SOA,” Computer Applications and Software, no. 10, 2005. View at Google Scholar
  10. MIT Lincoln Laboratory, 2000, http://www.ll.mit.edu/ideval/data/2000data.html.