Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2008, Article ID 475878, 11 pages
http://dx.doi.org/10.1155/2008/475878
Research Article

Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

1School of Information Science and Technology, East China Normal University, No. 500, Dong-Chuan Road, Shanghai 200241, China
2Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180-3590, USA

Received 24 March 2008; Accepted 1 April 2008

Academic Editor: Cristian Toma

Copyright © 2008 Ming Li and Wei Zhao. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [14 citations]

The following is the list of published articles that have cited the current article.

  • Supriya Pharande, Priyanka Pawar, P. W. Wani, and A. B. Patki, “Application of Hurst parameter and fuzzy logic for denial of service attack detection,” 2015 IEEE International Advance Computing Conference (IACC), pp. 834–838, . View at Publisher · View at Google Scholar
  • Xia Wang, Ming Li, and Muhai Li, “A scheme of distributed hop-count filtering of traffic,” IET Conference Publications, vol. 2009, no. 562, pp. 516–521, 2009. View at Publisher · View at Google Scholar
  • Muhai Li, and Ming Li, “A new approach for detecting DDoS attacks based on wavelet analysis,” Proceedings of the 2009 2nd International Congress on Image and Signal Processing, CISP'09, 2009. View at Publisher · View at Google Scholar
  • Ming Li, “Fractal Time Series—A Tutorial Review,” Mathematical Problems in Engineering, vol. 2010, pp. 1–27, 2010. View at Publisher · View at Google Scholar
  • Ming Li, and Wei Zhao, “Variance Bound of ACF Estimation of One Block of fGn with LRD,” Mathematical Problems in Engineering, vol. 2010, pp. 1–15, 2010. View at Publisher · View at Google Scholar
  • Yanfei Zheng, Kefei Chen, and Weidong Qiu, “Building Representative-Based Data Aggregation Tree in Wireless Sensor Networks,” Mathematical Problems in Engineering, vol. 2010, pp. 1–12, 2010. View at Publisher · View at Google Scholar
  • Zhengmin Xia, Songnian Lu, and Junhua Tang, “Note on Studying Change Point of LRD Traffic Based on Li's Detection of DDoS Flood Attacking,” Mathematical Problems in Engineering, vol. 2010, pp. 1–15, 2010. View at Publisher · View at Google Scholar
  • Maryam Shojaee, Behrouz Tork Ladani, and Naser Movahhedinia, “Traffic analysis for WiMAX network under DDoS attack,” 2010 2nd Pacific-Asia Conference on Circuits, Communications and System, PACCS 2010, vol. 1, pp. 279–283, 2010. View at Publisher · View at Google Scholar
  • Ming Li, “A Class of Negatively Fractal Dimensional Gaussian Random Functions,” Mathematical Problems in Engineering, vol. 2011, pp. 1–18, 2011. View at Publisher · View at Google Scholar
  • Inés Tejado, S. Hassan Hosseinnia, Blas M. Vinagre, Xiaona Song, and Yangquan Chen, “Dealing with fractional dynamics of ip network delays,” International Journal of Bifurcation and Chaos, vol. 22, no. 4, 2012. View at Publisher · View at Google Scholar
  • Ming Li, and Wei Zhao, “Asymptotic Identity in Min-Plus Algebra: A Report on CPNS,” Computational and Mathematical Methods in Medicine, vol. 2012, pp. 1–11, 2012. View at Publisher · View at Google Scholar
  • Jie Xue, Ming Li, Wei Zhao, and Sheng-Yong Chen, “Bound Maxima as a Traffic Feature under DDOS Flood Attacks,” Mathematical Problems in Engineering, vol. 2012, pp. 1–20, 2012. View at Publisher · View at Google Scholar
  • Maryam Shojaei, Naser Movahhedinia, and Behrouz Tork Ladani, “DDoS attack detection in IEEE 802.16 based networks,” Wireless Networks, 2014. View at Publisher · View at Google Scholar
  • Rup K. Deka, and Dhruba K. Bhattacharyya, “Self-similarity based DDoS attack detection using Hurst parameter,” Security and Communication Networks, 2016. View at Publisher · View at Google Scholar