Chen, C. and Park, J.-M. (2005). Attack diagnosis: Throt-
tling distributed denial-of-service attacks close to the
attack sources. In Proc. of IEEE ICCCN, pages 275–
280.
Chen, Y., Hwang, K., and Ku, W.-S. (2007). Collabo-
rative detection of DDoS attacks over multiple net-
work domains. IEEE Trans. Parallel Distrib. Syst.,
18(12):1649–1662.
Francois, J., Aib, I., and Boutaba, R. (2012). FireCol:
A collaborative protection network for the detec-
tion of flooding DDoS attacks. IEEE/ACM TON,
20(6):1828–1841.
Gil, T. M. and Poletto, T. (2001). MULTOPS: A data-
structure for bandwidth attack detection. In IProc. of
USENIX Security Symposium.
Impact Cyber Trust (2015). Colorado state uni-
versity dataset: ”FRGPContinuousFlowData”.
https://www.impactcybertrust.org/dataset view?idDa
taset=260. accessed 26-Oct-2016.
Ioannidis, J. and Bellovin, S. (2002). Implementing push-
back: Router-based defense against DDoS attacks. In
Proc. of NDSS.
Jung, J., Krishnamurthy, B., and Rabinovich, M. (2002).
Flash crowds and denial of service attacks: Character-
ization and implications for CDNs and web sites. In
Proc. of WWW conf., pages 293–304.
Kim, Y., Lau, W., Chuah, M., and et al. (2004). Pack-
etScore: Statistics-based overload control against dis-
tributed denial of service attacks. In Proc. of INFO-
COM, pages 141–155.
Lee, K., Kim, J., Kwon, K. H., and et al. (2007). DDoS
attack detection method using cluster analysis. Expert
Syst. with Applications, 34(3):1659–1665.
Mahajan, R., Bellovin, S. M., Floyd, S., and et al. (2002).
Controlling high bandwidth aggregates in the net-
work. ACM SIGCOMM, 32(3):62–73.
Manikopoulos, C. and Papavassiliou, S. (2002). Network
intrusion and fault detection: A statistical anomaly ap-
proach. IEEE Comm. Magazine, 40(10):76–82.
Mathew J. Schwartz (2014). DDoS Attack hits 400 Gbit/s,
Breaks Record. http://www.darkreading.com/attacks-
and-breaches/ddos-attack-hits-400-gbit-s-breaks-
record/d/d-id/1113787. accessed 2-Nov-2014.
Mirkovic, J., Prier, G., and Reiher, P. L. (2002). Attacking
DDoS at the source. In Proc. of IEEE ICNP, pages
312–321.
Mirkovic, J. and Reiher, P. (2005). D-WARD: A Source-
end defense against flooding denial-of-service attacks.
IEEE TDSC, 2(3):216–232.
Mitzenmacher, M. (2002). Compressed bloom filters.
IEEE/ACM TON, 10(5):604–612.
Munivara Prasad, K., Rama Mohan Reddy, A., and Venu-
gopal Rao, K. (2014). DoS and DDoS attacks: De-
fense, detection and traceback mechanisms - a survey.
Journal of JCST, 14(7-E):15–32.
Noh, S., Jung, G., Choi, K., and et al. (2008). Compiling
network traffic into rules using soft computing meth-
ods for the detection of flooding attacks. Journal of
Applied Soft Comp., 8(3):1200–1210.
Papadopoulos, C., Lindell, R., Mehringer, J., and et al.
(2003). COSSACK: Coordinated suppression of si-
multaneous attacks. In Proc. of Discex III, pages 94–
96.
Peng, T., Leckie, C., and Ramamohanarao, K. (2003). Pro-
tection from distributed denial of service attack using
history-based IP filtering. In Proc. of IEEE ICC, pages
482–486.
Peng, T., Leckie, C., and Ramamohanarao, K. (2004).
Detecting distributed denial of service attacks using
source IP address monitoring. In Proc. of NET-
WORKS.
Peng, T., Leckie, C., and Ramamohanarao, K. (2007). Sur-
vey of network-based defense mechanisms countering
the DoS and DDoS problems. ACM Computing Sur-
veys, 39(1):1–42.
RioRey, Inc. (2012). Taxonomy DDoS attacks.
http://www.riorey.com/xresources/2012/RioRe.
accessed 24-Dec-2015.
Steinberger, J., Sperotto, A., and Baier, H. (2005). Collab-
orative attack mitigation and response: A survey. In
IFIP/IEEE Int. Symp. on IM, pages 910–913.
Sung, M. and Xu, J. (2003). IP traceback-based intel-
ligent packet filtering: A novel technique for de-
fending against internet DDoS attacks. IEEE TPDS,
14(9):861–872.
Waikato Applied Network Dynamics Research Group
(2016). Auckland university data traces.
http://wand.cs.waikato.ac.nz/wand/wits/. accessed
12-March-2016.
Wang, H., Jin, C., and Shin, K. (2007). Defense
against spoofed IP traffic using hop-count filtering.
IEEE/ACM Trans. on Networking, 15(1):40–53.
Wang, H., Zhang, D., and Shin, K. (2002). Detecting SYN
flooding attacks. In Proc of IEEE INFOCOM, pages
530–1539.
Wang, H., Zhang, D., and Shin, K. (2004). Change-Point
monitoring for the detection of DoS attacks. IEEE
TDSC, 1(4):193–208.
Yaar, Y., Perrig, A., and Song, D. (2003). Pi: A path iden-
tification mechanism to defend against DDoS attacks.
In Proc. of IEEE S&P, pages 93–107.
Yaar, Y., Perrig, A., and Song, D. (2004). SIFF: A stateless
internet flow filter to mitigate DDoS flooding attacks.
In Proc. of IEEE S&P, pages 130–143.
SECRYPT 2017 - 14th International Conference on Security and Cryptography
186