id author title date pages extension mime words sentences flesch summary cache txt work_v235goyagzaddouqdgpxiwrmsi Shun-Chieh Lin Constructing detection knowledge for DDoS intrusion tolerance 2004 12 .pdf application/pdf 8644 755 60 rapid development of network technology, distributed denial of service (DDoS) attacks become one of the most important issues today. (the representation of the behaviors of system and users) and the Defense model (the descriptions of Detection and Filter methodologies). Based upon the ontology, four KCs (Profile model, Evaluation strategy, Detection methodology, and Filter methodology Knowledge Classes) and their relationships are then proposed, where each KC may contain a set of sub-KCs or intrusion tolerance system for DDoS attacks to evaluate the proposed models. Keywords: Distributed denial of service (DDoS); Intrusion tolerance; Ontology; Knowledge acquisition; NORM knowledge base to store the characteristics of DDoS attacks, knowledge base to store the characteristics of DDoS attacks, detecting for defending flooding-based DDoS attacks. detection rules, and setting filter policies by domain experts. DDoS attacks, the Profile model including system state and Constructing detection knowledge for DDoS intrusion tolerance Constructing detection knowledge for DDoS intrusion tolerance ./cache/work_v235goyagzaddouqdgpxiwrmsi.pdf ./txt/work_v235goyagzaddouqdgpxiwrmsi.txt