Kuzmanovic A, Knightly E W. Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 2003, 75–86
Wu Z, Li W, Liu L, Yue M. Low-rate DoS attacks, detection, defense, and challenges: a survey. IEEE Access, 2020, 8: 43920–43943
Article
Google Scholar
Liu Q, Peng Y, Wu J, Wang T, Wang G. Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Transactions on Network and Service Management, 2021, 18(2): 2046–2062
Article
Google Scholar
Li X, Liu S, Wu F, Kumari S, Rodrigues J J P C. Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet of Things Journal, 2019, 6(3): 4755–4763
Article
Google Scholar
Liang W, Xiao L, Zhang K, Tang M, He D, Li K C. Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet of Things Journal, 2021
Patel S, Gupta B, Sharma V. Throughput analysis of AQM schemes under low-rate Denial of service attacks. In: Proceedings of 2016 International Conference on Computing, Communication and Automation (ICCCA). 2016, 551–554
Rahman M U, Rahman Z U, Fayaz M, Abbas S, ShahSani R K. Performance analysis of TCP/AQM under low-rate denial-of-service attacks. In: Proceedings of 2016 International Conference on Inventive Computation Technologies. 2016, 1–5
Chen Z, Pham T N D, Yeo C K, Lee B S, Lau C T. FRRED: fourier robust RED algorithm to detect and mitigate LDoS attacks. In: Proceedings of Zooming Innovation in Consumer Electronics International Conference. 2017, 13–17
Kaur K P, Kaur N, Singh G. Simulation and comparison of various queuing algorithms based on their performance using CPR approach in detection of LDDoS attacks. International Journal of Computer Applications, 2014, 93(10): 7–13
Article
Google Scholar
Cao Y, Ji R, Ji L, Bao M, Tao L, Yang W. Can multipath TCP be robust to Cyber Attacks? A measuring study of MPTCP with active queue management algorithms. Security and Communication Networks, 2021, 2021: 9963829
Google Scholar
Kwok Y K, Tripathi R, Chen Y, Hwang K. HAWK: halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. In: Proceedings of the 3rd International Conference on Networking and Mobile Computing. 2005, 423–432
Zhang J, Hu H P, Liu B, Chen X. Method to counter LDoS attack based on the average length of packet in the queue. In: Proceedings of International Conference of China Communication and Technology. 2010, 418–421
Zhang C, Cai Z, Chen W, Luo X, Yin J. Flow level detection and filtering of low-rate DDoS. Computer Networks, 2012, 56(15): 3417–3431
Article
Google Scholar
Guo Y, Duan H, Chen J, Miao F. MAF-SAM: an effective method to perceive data plane threats of inter domain routing system. Computer Networks, 2016, 110: 69–78
Article
Google Scholar
Wu Z, Yue M, Li D, Xie K. SEDP-based detection of low-rate DoS attacks. International Journal of Communication Systems, 2015, 28(11): 1772–1788
Article
Google Scholar
Cotae P, Kang M, Velazquez A. Spectral analysis of low rate of denial of service attacks detection based on fisher and Siegel tests. In: Proceedings of 2016 IEEE International Conference on Communications. 2016, 1–6
Ain A, Bhuyan M H, Bhattacharyya D K, Kalita J K. Rank correlation for low-rate DDoS attack detection: an empirical evaluation. International Journal of Network Security, 2016, 18(3): 474–480
Google Scholar
Wu Z, Jun J, Meng Y. A particle filter-based approach for effectively detecting low-rate denial of service attacks. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. 2016, 86–90
Wu Z J, Zhang H T, Wang M H, Pei B S. MSABMS-based approach of detecting LDoS attack. Computers & Security, 2012, 31(4): 402–417
Article
Google Scholar
Tang D, Tang L, Dai R, Chen J, Li X, Rodrigues J J P C. MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost. Future Generation Computer Systems, 2020, 106: 347–359
Article
Google Scholar
Yue M, Liu L, Wu Z, Wang M. Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network. International Journal of Communication Systems, 2018, 31(2): e3449
Article
Google Scholar
Tang D, Man J, Tang L, Feng Y, Yang Q. WEDMS: an advanced mean shift clustering algorithm for LDoS attacks detection. Ad Hoc Networks, 2020, 102: 102145
Article
Google Scholar
Wu Z, Zhang L, Yue M. Low-rate DoS attacks detection based on network multifractal. IEEE Transactions on Dependable and Secure Computing, 2016, 13(5): 559–567
Article
Google Scholar
Zhang X, Wu Z, Chen J, Yue M. An adaptive KPCA approach for detecting LDoS attack. International Journal of Communication Systems, 2017, 30(4): e2993
Article
Google Scholar
Zhan S, Tang D, Man J, Dai R, Wang X. Low-rate DoS attacks detection based on MAF-ADM. Sensors, 2020, 20(1): 189
Article
Google Scholar
Liu L, Wang H, Wu Z, Yue M. The detection method of low-rate DoS attack based on multi-feature fusion. Digital Communications and Networks, 2020, 6(4): 504–513
Article
Google Scholar
Tang D, Feng Y, Zhang S, Qin Z. FR-RED: fractal residual based realtime detection of the LDoS attack. IEEE Transactions on Reliability, 2021, 70(3): 1143–1157
Article
Google Scholar
Tang D, Zhang S, Chen J, Wang X. The detection of low-rate DoS attacks using the SADBSCAN algorithm. Information Sciences, 2021, 565: 229–247
MathSciNet
Article
Google Scholar
Li D. Artificial intelligence with uncertainty. In: Proceedings of the 4th International Conference on Computer and Information Technology. 2004, 15(11): 1583–1594
Qin B, Zhou X, Yang J, Song C. Grey-theory based intrusion detection model. Journal of Systems Engineering and Electronics, 2006, 17(1): 230–235
Article
Google Scholar
Fall K, Varadhan K. The ns manual (formerly ns notes and documentation). The VINT Project, 2005, 47: 19–231
Google Scholar
Li D, Liu C, Gan W. A new cognitive model: cloud model. International Journal of Intelligent Systems, 2009, 24(3): 357–375
Article
Google Scholar
Cristianini N, Shawe-Taylor J. Linear learning machines. In: Cristianini N, Shawe-Taylor J, eds. An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge: Cambridge University Press, 2000, 9–25
Chapter
Google Scholar
Cortes C, Vapnik V. Support-vector networks. Machine Learning, 1995, 20(3): 273–297
MATH
Google Scholar
Wu Z J, Yue M. Detection of LDDoS attack based on Kalman filtering. Acta Electronica Sinica, 2008, 36(8): 1590–1594
Google Scholar