References
- W.-C. Kang, Y.-H. Lee, Y.-S. Lee, "A Hadoop-based Traffic Analysis System Architecture for Multiple Users," Proceedings of KIISE, vol. 38, no. 1D, pp.252-255, 2011. http://www.dbpia.co.kr/Journal/ArticleDetail/NODE0168 0166
- B.-M. Choi, J.-H. Kong, M.-M. Han, "The Model of Network Packet Analysis based on Big Data," Journal of Korean Institute of Intelligent Systems, vol. 23, no. 5, pp.392-39, Oct. 2013. http://www.riss.kr/link?id=A99799696 https://doi.org/10.5391/JKIIS.2013.23.5.392
- T.-K. Ju, C.-M. Hong, W. Shin, "A Monitoring Tool for Personal Information Leakage Prevention in Network Packets," Journal of Information Processing Systems, vol. 2, no. 11, pp.489-494, 2013. http://www.riss.kr/link?id=A99920290
- W. Leland, M. Taqqu, W. Willinger, and D. Wilson. "On the Self-Similar Nature of Ethernet Traffic (Extended Version)," IEEE ACM Transactions on Networking, vol. 2, no. 1, pp. 1-15, 1994. http://ecee.colorado.edu/-ecen5032/handouts/94LelandSe lfSim.pdf https://doi.org/10.1109/90.282603
- H.-D. Jeong, J.-S. Lee, Pawlikowski, K. and McNickle, D. "Comparison of Various Estimators in Simulated FGN," Simulation Modelling Practice and Theory. vol.15, pp. 1173-1191, Oct. 2007. http://www.sciencedirect.com/science/article/pii/S156919 0X07001013 https://doi.org/10.1016/j.simpat.2007.08.004
- H.-D. Jeong, J.-S. Lee, D. McNickle, K. Pawlikowski, Self-Similar Properties of Malicious Teletraffic, International Journal of Computer Systems Science and Engineering 28(1) (2012) 1-7. http://dblp.uni-trier.de/db/journals/csse/csse27.html#Lee MPJ12
- M.-S. Kim, "Internet application traffic monitoring and analysis," PhD Thesis, Dept. of Computer Science and Engineering, Pohang University of Science and Technology (POSTECH), 2004. http://www.riss.kr/link?id=T13645544
- J.-S. Lee and S.-K. Ye, H.-D. Jeong, "ATMSim: an Anomaly Teletraffic Detection Measurement Analysis Simulator," Simulation Modelling Practice and Theory, vol. 49, pp.98-109, 2014. http://www.riss.kr/link?id=O64187481 https://doi.org/10.1016/j.simpat.2014.09.001
- H.-J. Lee, "Uitilization of Big Data Hadoop Platform," Journal of KICS, vol. 29, no. 11, pp.43-47, 2012. http://www.riss.kr/link?id=A100392834
- J.-P. Lee, "Security framework of big data distributed processing environment using Hadoop," Hannam University, 2014. http://www.riss.kr/link?id=T13378318
- C.-B. Kim, J.-P. Chung, "Processing Method of Mass Small File Using Hadoop Platform," Journal of KONI, vol. 18, no. 4, pp.401-408, 2014. http://www.riss.kr/link?id=A100111693
- X. Su, G. Swart, "Oracle in-database Hadoop: When MapReduce Meets RDBMS," in: SIGMOD '12: Proceedings of the 2012 International Conference on Management of Data, pp. 779-790, 2012. http://www.cs.yale.edu/homes/xs45/pdf/ss-sigmod2012.pdf
- M.-J. Ji, E.-K. Cho, S.-R. Kim, I.-S. You, H.-D. Jeong, "Setting Rules for a Fraud Detection System by Applying ATMSim in Mobile Internet Environment," Proceedings of KSII, vol. 16 no. 1, 2015. http://www.riss.kr/link?id=A100503751
- Financial Security Agency, "Response Manual for the Different Types of DDoS Attacks," 2008.
- Kaspersky. Lab, "Kaspersky DDoS Intelligence Report Q2 2015" Kaspersky, Aug. 2015. https://securelist.com/analysis/quarterly-malware-reports/71663/kaspersky-ddos-intelligence-report-q2-2015/
- Chris. Plante, "Valve's $18 million Dota 2 tournament delayed by DDoS attack," THEVERGE, Aug. 2015.
- Cisco Systems, "NetFlow Services and Applications," White Papers. http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.htm
- Netbot, http://www.hackeroo.com.
Cited by
- Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim vol.1, pp.3, 2017, https://doi.org/10.3390/cryptography1030024