@incollection{, 34D406758282F755DEFEA615268865AD , author={{R.Sreenath} and {E.S.Phalgunakrishna} and {SREE VIDYANIKETHAN ENGINEERING COLLEGE}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1531114 } @incollection{b0, , title={{Detection and defense of application-layer DDoS attacks in backbone Web traffic}} , author={{ WeiZhou } and { Weijiajia } and { YangxiangShengwen } and { WanleiZhou }} , journal={{Future Generation Computer Systems}} 38 , year={2014} } @incollection{b1, , title={{A Hybrid Approach to Counter Application Layer DDoS Attacks}} , author={{ SDevi } and { PYogesh }} , journal={{International Journal on Cryptography and Information Security (IJCIS)}} 2 2 , year={June 2012} } @book{b2, , title={{Worldwide network infrastructure security report}} , author={{ Arbor } and { Networks }} , year={2011} , publisher={Arbor Networks} , note={Tech. Rep.} } @incollection{b3, , title={{A large-scale hidden semi-Markov model for anomaly Detectionon user browsing behaviors}} , author={{ YXie } and { SYu }} , journal={{IEEE/ACM Trans.Netw}} 17 1 , year={2009} } @book{b4, , title={{Captcha: using hardai problemsFor security}} , author={{ LVon Ahn } and { MBlum } and { NJHopper } and { JLangford }} , year={2003} , publisher={EUROCRYPT} } @incollection{b5, , title={{Botz-4-sale: surviving organized Ddos attacks that mimic flash crowds}} , author={{ SKandula } and { DKatabi } and { MJacob } and { ABerger }} , booktitle={{Proceedings of the 2nd Conference On Symposiumon Networked Systems Design and Implementation," NSDI'05,USENIX Association}} the 2nd Conference On Symposiumon Networked Systems Design and Implementation," NSDI'05,USENIX AssociationBerkeley, CA, USA , year={2005} } @incollection{b6, , title={{A signal analysis of network traffic anomalies}} , author={{ PBarford } and { JKline } and { DPlonka } and { ARon }} , booktitle={{Proceedings of the 2 nd ACMSIGCOMM Work shop on Internet Measurement}} the 2 nd ACMSIGCOMM Work shop on Internet MeasurementNew York, NY, USA , publisher={IMW' 02, ACM} , year={2002} } @incollection{b7, , title={{DDoS defense by offense}} , author={{ MWalfish } and { MVutukuru } and { HBalakrishnan } and { DKarger } and { SShenker }} , journal={{ACM Trans. Comput. Syst}} 28 1 , year={2010} } @incollection{b8, , title={{DDoS-resilient scheduling to counter application layer attacks under imperfect detection}} , author={{ SRanjan } and { RSwaminathan } and { MUysal } and { EKnightly }} , booktitle={{Proceedings". INFOCOM 2006. 25th IEEE International Conference on Computer Communications}} ". INFOCOM 2006. 25th IEEE International Conference on Computer Communications , year={2006} } @incollection{b9, , title={{Monitoring the application-layer ddos attacks for popular websites}} , author={{ YXie } and { SZhengyu }} , journal={{IEEE/ACM Trans. Netw}} 17 1 , year={2009} } @book{b10, , title={{}} , author={{ D = |hnew }} , editor={R)| -|H(R)|} }