Analysis and simulation of DOS attack detection using dependency and correlation
Muhammad Abu Baker Ilyas
- Rawalpindi MCS (NUST) April 2007
- xi, 91, p.
Introduction (page-1) Anatomy of denial of service attacks (page-6) Survey of Major denial of service incidents (page-21) Detecting and mitigating denial of service attacks (page-33) Detecting sources of dos attacks (page-44) Proposed feature selection method (page-61) Implementation and results (page-70) Conclusion and future work (page-81).