|
[1] S. Tritilanunt, T. Salakit, and P. Achwacheewanthomkul, "IP traceback system for denial-of-service attacks," in Proceedings of the IEEE International Conference on Information Science, Electronics and Electrical Engineering, Sapporo, 2014, pp. 1868-1871. [2] U. Tupakula and V. Varadharajan, "Securing mobile devices from DoS attacks," in Proceedings of the IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, 2013, pp. 34-41. [3] M. Alenezi and M. J. Reed, "Traceback of DoS over autonomous systems," International Journal of Network Security & Its Applications, Vol. 5, pp. 131-142, 2013. [4] B. Liu, J. Bi, and X. Yang, "FaaS: filtering IP spoofing traffic as a service," in Proceedings of the ACM SIGCOMM, NY, USA, 2012, pp. 113-114. [5] D. Wei and N. Ansari, "Implementing IP traceback in the internet – an ISP perspective," in Proceedings of the 3th Workshop on Information Assurance United States Military Academy, 2002, pp. 326-332. [6] H.-H. Chen and W. Yang, "The Design and implementation of a practical meta-heuristic for the detection and identification of denial-of-service attack using hybrid approach," in Proceedings of the IEEE 2th International Conference on Machine Learning and Computing (ICMLC 2010), Bangalore, India, 2010, pp. 47-51. [7] M. Dorigo and L. M. Gambardella, "Ant colony system: a cooperative learning approach to the traveling salesman problem," IEEE Transactions on Evolutionary Computation, Vol. 1, pp. 53-66, 1997. [8] H. Jiang, Q. Yu, and Y. Huang, "An improved ant colony algorithm for urban transit network optimization," in Proceedings of the 6th International Conference on Natural Computation, Yantai, Shandong, 2010, pp. 2739-2743. [9] D. Yan, Y. L. Wang, S. Su, and F. C. Yang, "An efficient collaborative traceback scheme based on packet digests logging," in Proceedings of the 10th International Conference on Computer Information Technology, Bradford, 2010, pp. 2811-2815. [10] S. M. Bellovin, ICMP traceback messages, http://tools.ietf.org/html/draft-ietf-itrace-04. [11] H. Guerid, A. Serhrouchni, M. Achemlal, and K. Mitting, "A novel traceback approach for direct and reflected ICMP attacks," in Proceedings of Conference on Network and Information Systems Security, La Rochelle, 2011, pp. 1-5. [12] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network support for IP traceback," IEEE/ACM Transactions on Networking, Vol. 9, pp. 226-237, 2001. [13] A. Shevtekarand N. Ansari, "Do low rate DoS attacks affect QoS sensitive VoIP traffic," in Proceedings of the IEEE International Conference on Communications, Istanbul, 2006, pp. 2153-2158. [14] G. H. Lai, C. M. Chen, B. C. Jeng, and W. Chao, "Ant-based IP traceback," Expert Systems with Application, Vol. 34, pp. 3071-3080, 2008. [15] B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, Vol. 13, pp. 422-426, 1970. [16] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-packet IP traceback," IEEE/ACM Transactions on Networking, Vol. 10, pp. 721-734, 2002. [17] A. Shevtekar and N. Ansari, "Is it congestion or a DDoS attack?" IEEE Communications Letters, Vol. 13, pp. 546-548, 2009. [18] W. Zhijun, M. Lan, W. Minghua, Y. Meng, and W. Lu, "Research on time synchronization and flow aggregation in LDDoS attack based on cross-correlation," in Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 2012, pp. 25-32. [19] H. Aljifri, "IP traceback: a new denial-of-service deterrent?" IEEE Security & Privacy, Vol. 1, pp. 24-31, 2003. [20] M. Dorigo, V. Maniezzo, and A. Colorni, "Ant system: optimization by a colony of cooperating agents," IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, Vol. 26, pp. 29-41, 1996. [21] P. Wang, T. C. Wang, P. T. Kuo, and C. P. Wang, "An analysis model of botnet tracking based on ant colony optimization algorithm," in Proceedings of the 6th International Conference on Networking Computing and Advanced Information Management, Seoul, 2010, pp. 606-611. [22] M. Hamedi-Hamzehkolaieand M. J. Shamani, "Ant colony traceback for low rate DoS attack," International Journal of Computer Applications, Special Issue on Computational Intelligence & Information Security, pp. 22-26, 2012. [23] N. Arumugan and C. Venkatesh, "Ant system algorithm based IP traceback method to detect dential of service attack on data network," Australian Journal of Basic and Applied Sciences, Vol. 7, pp. 732-741, 2013. [24] D. Juneja and N. Arora, "An ant based frameworks for preventing DDoS attack in wireless sensor networks," International Journal of Advancements in Technology, Vol. 1, pp. 34-44, 2010. [25] Massachusetts Institute Technology, MIT 2000 DARPA intrusion detection evaluation data set, MIT Lincoln Laboratory, http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html. [26] KDDCup99 Data, Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection, from MIT Lincoln Laboratory dataset, http://kdd.ics.uci.edu/databases/kddcup99/task.html. [27] S. T. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Communications Surveys & Tutorials, Vol. 15, pp. 2046-2069, 2013. [28] X. Zhang, Z. Zhou, and G. Hasker, "Network fault localization with small TCB," in Proceedings of the 19th International Conference on Network Protocols, 2011, pp. 143-154. [29] B. Patil, S. Kinger, and V. K. Pathak, "Probe station placement algorithm for probe set reduction in network fault localization," in Proceedings of the International Conference on Information System and Computer Networks, Singapore, 2013, pp. 164-169. [30] A. Johnsson and C. Meirosu, "Towards automatic network fault localization in real time using probabilistic inference," in Proceedings of the IEEE International Symposium on Integrated Network Management, Ghent, 2013, pp. 1393-1398. [31] T. Inoue, T. Mano, K. Mizutani, S. -I. Minato, and O. Akashi, "Rethinking packet classification for global network view of software-defined networking," in Proceedings of the 22th International Conference on Network Protocols, Raleigh, NC, 2014, pp. 296-307. [32] W. E. Wong and Y. Ui, "BP neural network-based effective fault localization," International Journal of Software Engineering and Knowledge Engineering, Vol. 19, pp. 573-597, 2009. [33] W. E. Wong and V. Debroy, "A survey of software fault localization," Technical Report UTDCS-45-09, University of Texas at Dallas, 2009. [34] W. E. Wong, T. Wei, Y. Qi, and L. Zhao, "A crosstab-based statistical method for effective fault localization," in Proceedings of the International Conference on Software Testing, Verification and Validation, Lillehammer, 2008, pp. 42-51. [35] H. Cleveand A. Zeller, "Locating causes of program failures," in Proceedings of the IEEE 27th International Conference on Software Engineering, 2005, pp. 342-351. [36] M. Renieris and S.P. Reiss, "Fault localization with nearest neighbor queries," in Proceedings of the IEEE Automated Software Engineering, 2003, pp. 30-39. [37] M.A. Feckoand M. Steinder, "Combinatorial designs in multiple faults localization for battlefield networks," in Proceedings of the Military Communication Conference, 2001, pp. 938-942. [38] L. Chunfang, L. Lianzhong, and L. Xiangyu, "Software networks of Java class and application in fault localization," in Proceedings of the 2th International Conference on Intelligent System Design and Engineering Application, Sanya, Hainan, 2012, pp. 1117-1120. [39] K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets," in Proceedings of ACM SIGCOMM, San Diego, California, USA, 2001, pp. 15-26. [40] E. Toth, Z. Hornak, and G. Toth, "Protection system against overload and distributed denial of service attacks," in Proceedings of the 3th International Conference on Dependability of Computer Systems, Szklarska Poreba, 2008, pp. 195-202. [41] M. Abliz, "Internet denial of service attacks and defense mechanisms," Technical Report, Department of Computer Science, University of Pittsburgh, 2011. [42] R. Stone, "Centertrack: an IP overlay network for tracking DoS floods," in Proceedings of the USENIX Security Symposium, CA, USA, 2000, pp. 199-212. [43] Y. Bhavani, V. Janaki, and R. Sridevi, "IP traceback through modified probabilistic packet marking algorithm," in Proceedings of Region 10 Conference on TENCON, Xi'an, 2013, pp. 1-5. [44] S. Fowler, S. Zeadally, and N. Chilamkurti, "Impact of denial of service solutions on network quality of service," Security and Communication Networks, Vol. 4, pp. 1089-1103, 2011. [45] A. Garga nd A. L. N. Reddy, "Mitigation of DoS attacks through QoS regulation," in Proceedings of the IEEE International Workshop on Quality of Service, 2002, pp. 45-53. [46] E. Fulp, Z. Fu, D. S. Reeves, S. F. Wu, and X. Zhang, "Preventing denial of service attacks on quality of service," in Proceedings of the IEEE DARPA Information Survivability Conference on Exposition II, Anaheim, CA, 2001, pp. 159-172. [47] L. Mchale, J. Casey, P. V. Gratz, and A. Sprintson, "Stochastic pre-classification for SDN data plane matching," in Proceedings of the IEEE 22nd International Conference on Network Protocols, Washington, DC, USA, 2014, pp. 596-602. [48] P. Qwezarski, "On the impact of DoS attacks on internet traffic characteristics and QoS," in Proceedings of the IEEE 14th International Conference on Computer Communications and Networks, 2005, pp. 269-274. [49] E. Chemeritskiy and R. Smelansky, "On QoS management in SDN by multipath routing," in Proceedings of the IEEE International Science and Technology Conference, Moscow, 2014, pp. 1-6. [50] N. Yaakob, I. Khalil, H. Kumarage, M. Atiquzzaman, and Z. Tari, "By-passing infected areas in wireless sensor networks using BPR," IEEE Transactions on Computers, Vol. 64, pp. 1594-1606, 2015. [51] A. Belghith, S. B. H. Said, B. Cousin, and S. Lahoud, "QoS fault detection and localization mechanisms (FDLM) in multi-domain networks adapted to export methods," in Proceedings of the IEEE 14th International Conference on Advanced Communication Technology, PyeongChang, 2012, pp. 848-853. [52] G. Wang, Y. QIAO, X. QIU, and L. MENG, "An improved network performance anomaly detection and localization algorithm," in Proceddings of the IEEE 14th Asia-Pacific Network Operations and Management Symposium, Seoul, 2012, pp. 1-4. [53] P. Barford, N. Duffield, A. Ron, and J. Sommers, "Network performance anomaly detection and localization," in Proceedings of the IEEE INFOCOM, Rio de Janeiro, 2009, pp. 1377-1385. [54] X. Chen, J. Zhang, Y. Xiang, and W. Zhou, "Traffic identification in semi-known network environment," in Proceddings of the IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, 2013, pp. 572-579. [55] K. V. M. Naidu, D. Panigrahi, and R. Rastogi, "Detecting anomalies using end-to-end path measurements," in Proceedings of the IEEE INFOCOM, 2008, Phoenix, AZ, 2008, pp. 16-20. [56] B. Sonkoly, F. Nemeth, L. Csikor, L. Gulyas, and A. Gulyas, "SDN based testbeds for evaluating and promoting multipath TCP," in Proceedings of the IEEE International Conference on Communications, Sydney, NSW, 2014, pp. 3044-3050. [57] M. Dorigo, V. Maniezzo, and A. Colorni, "Ant system: an autocatalytic optimizing process," Technical Report, Department of Electronical Information, Politecnico di Milano, 1991. [58] M. T. Goodrich, "Probabilistic packet marking for large-scale IP traceback," IEEE/ACM Transactions on Networking, Vol. 16, pp. 15-24, 2008. [59] P. Sattari, M. Gjoka, and A. Markopoulou, "A Network Coding Approach to IP Traceback," in Proceedings of the International Conference on Networking Coding, Toronto, ON, 2010, pp. 1-6. [60] H. Aqrawaland J. R. Horqan, "Dynamic program slicing," in Proceedings of ACM SIGPLAN Conference on Programming language design and implementation, New York, NY, USA, 1990, pp. 246-256. [61] M. Weiser, "Program slicing," in Proceedings of the ACM 5th International Conference on Software Engineering, NJ, USA, 1981, pp. 439-449. [62] S. -S. Choi, S. -H. Cha, and C. C. Tappert, "A survey of binary similarity and distance measures," Journal of Systemics, Cybernetics and Informatics, Vol. 8, pp. 43-48, 2010. [63] O. N. Fundation, Openflow. http://www.openflow.org. [64] M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford. A NICE way to test openflow applications, in Proceedings of the ACM 9th USENIX conference on Networked Systems Design and Implementation, Berkeley, CA, USA, 2012, pp. 127-140. [65] N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. Mckeown, Where is the debugger for software-defined network, in Proceedings of the first workshop on Hot topics in software defined networks, NY, USA, 2012, pp. 55-60. [66] W. E. Wong, V. Debroy, G. Ruizhi, and L. Yihao, "The DStar method for effective software fault localization," IEEE Transactions on Reliability, Vol. 63, pp. 290-308, 2013. [67] R. Abreu, P. Zoeteweij, R. Golsteijn, and A. J. C. V. Gemund, "A practical evaluation of spectrum-based fault localization," Journal of Systems and Software, Vol. 82, pp. 1780-1792, 2009. [68] J. A. Jones and M. J. Harrold, "Empirical evaluation of the tarantula automatic fault-localization technique," in Proceedings of the IEEE 20th International Conference on Automated Software Engineering, NY, USA, 2005, pp. 273-282. [69] L. Naish, H. J. Lee, and K. Ramamohanarao, "A model for spectra-based software diagnosis," ACM Transactions on Software Engineering Methodology, Vol. 20, pp. 1-37, 2011. [70] A. M. Rao, S. Varadarajan, and M. N. G. Prasad, "Cross-layer based QOS routing protocol analysis based on nodes for 802.16 WIMAX networks," International Journal of Advances in Engineering and Technology, Vol. 1, pp. 290-298, 2011. [71] M. Hamedid-Hamzehkolaie, R. Sanei, C. Chen, and X. Tian, "Bee-based IP traceback," in Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, Xiamen, 2014, pp. 968-972. [72] G. Mahalakshmi and P. Subathra, "A survey on prevention approaches for denial of sleep attacks in wireless networks," Journal of Emerging Technologies in Web Intelligence, Vol. 6, pp. 106-110, 2014. [73] L. A. Wuand W. Q. Fan, "A parameter model of genetic algorithm regulating ant colony algorithm," in Proceedings of the 9th International Conference on e-Business Engineering, Hangzhou, 2012, pp. 50-54. [74] M. Dorigo, E. Bonabeau, and G. Theraulaz, "Ant algorithms and stigmergy," Future Generation Computer Systems, Vol. 16, pp. 851-871, 2000. [75] L. M. Gambardellaand M. Dorigo, "Ant-Q: a reinforcement learning approach to the traveling salesman problem," in Proceedings of the 12th International Conference on Machine Learning, 1995, pp. 252-260. [76] L. Fan, P. Cao, J. Almeida, and A. Z. Broder, "Summary cache: a scalable widearea web cache sharing protocol," IEEE/ACM Transactions on Networking, Vol. 8, pp. 281-293, 2000. [77] L. A. Zadeh, "Fuzzy logic, neural networks, and soft computing," in Proceedings of IEEE International Workshop Neuro Fuzzy Control, NY, USA, 1993, pp. 1-3. [78] H. R. Dhasianand P. Balasubramanian, "Survey of data affirmation techniques using soft computing in wireless sensor networks," IET Information Security, Vol. 7, pp. 336-342, 2013. [79] A. M. Wildberger, "Overview of exploratory research in soft computing applications to power systems at the electric power research institute," in Proceedings of the International Conference on Systems, Man and Cybernetics, Vancouver, BC, 1995, pp. 2007-2012. [80] Q. Zhu, Z. Yizhi, and X. Chuiyi, "Research and survey of low-rate denial of service attacks," in Proceedings of the 13th International Conference on Advanced Communication Technology, Seoul, 2011, pp. 1195-1198. [81] C. Zhang, Z. Cai, W. Chen, X. Luo, and J. Yin, "Flow level detection and filtering of low-rate DDoS," Computer Networks, Vol. 56, pp. 3417-3431, 2012. [82] H.-H. Chen and S.-K. Huang, "A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS Attacks," in Proceedings of the IOS International Computer Symposium (ICS 2014), Taichung, Taiwan, 2014, pp. 125-139. [83] P. Shinde and S. Guntupalli, "Early DoS attack detection using smoothend time-series and wavelet analysis," in Proceedings of the 3th International Symposium on Information Assurance and Security, 2007, pp. 215-220. [84] A. Boneh and M. Hofri, "The coupon-collector problem revisited - a survey of engineering problems and computational methods," Stochastic Models, Vol. 13, pp. 39-66, 1997. [85] W. Feller, An Introduction to Probability Theory and Its Applications, Wiley, 1966. [86] M. Effros, "PPM performance with BWT complexity: a fast and effective data compression algorithm," in Proceedngs of IEEE, Vol. 88, 2000, pp. 1703-1712. [87] M. H. Yangand M. C. Yang, "RIHT: A novel hybrid IP traceback scheme," IEEE Transactions on Information Forensics and Security, Vol. 7, pp. 789-797, 2002. [88] J. Sommers, V. Yegneswaran, and P. Barford, "A framework for malicious workload generation," in Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, NY, USA, 2004, pp. 82-87. [89] L. P. Swiler, C. Phillips, D. Ellis, and S. Chakerian, "Computer-attack graph generation tool," in Proceedings of the IEEE DARPA Information Survuvability Conference and Exposition II, Anaheim, CA, 2001, pp. 307-321. [90] H. -H. Chen, H. -L. Lu, S. -K. Huang, R. Gao, and W. E. Wong, "Diagnosing SDN Network Problems by Using Spectrum-based Fault Localization Techniques," in Proceedings of the IEEE International Conference on Software Quality, Reliability & Security (QRS 2015), Vancouver, Canada, 2015, pp. 121-127. [91] P. Kazemian, G. Varghese, and N. Mckeown, "Header space analysis: static checking for networks," in Proceedings of the 9th Conference on Networked Systems Design and Implementation, Berkeley, CA, USA, 2012, pp. 1-14. [92] A. M. Koushika and S. T. Selvi, "Load valancing using software defined networking in cloud environment," in Proceedings of the International Conference on Recent Trends in Information Technology, Chennai, 2014, pp. 1-8. [93] Minimum-cost flow, https://en.wikipedia.org/wiki/Minimum-cost_flow_problem. [94] R. Durairajan, J. Sommers, and P. Barford, "Controller-agnostic SDN Debugging," in Proceedings of the ACM 10th International Conference on Emerging Networking Experiments and Technologies, NY, USA, 2014, pp. 227-234. [95] K. Agarwal, E. Rozner, C. Dixon, and J. Carter, "SDN traceroute: tracing SDN forwarding without changing network behavior," in Proceedings of the ACM 3th workshop on Hot topics in software defined networking, NY, USA, 2014, pp. 45-150. [96] H. -H. Chen, C. -H. Lee, and S. -K. Huang, "A Unified Ant Agent Framework for Solving DoS and QoS Problems," Journal of Information Science and Engineering, 2016. (accepted, SCI) [97] H. -H. Chen and S. -K. Huang, "LDDoS Attack Detection by Using Ant Colony Optimization Algorithms," Journal of Information Science and Engineering, Vol. 32, pp. 995-1020, 2015. (SCI) [98] H. -H. Chen, H. -L. Lu, S. -K. Huang, R. Gao, and W. E. Wong, "Diagnosing Software Defined Network by Using Software Fault Localization Methods," submitted to Journal of Systems and Software, 2016. (SCI) [99] H. -H. Chen, D. -Q. Zheng, and S. -K. Huang, "Automatic Defense by Fault Localization and Dynamic Patch," submitted to IEEE International Conference on Software Quality, Reliability & Security (QRS 2016), Vienna, Austria, 2016. [100] Y. -D. Lin, F. -Z. Liao, H. -H. Chen, S. -K. Huang and Y. -C. Lai, "Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models," to be submitted to Journal of Systems and Software, 2016. (SCI) |