L. Garber, Denial-of-service attacks rip the internet, Computer, vol.33, issue.4, pp.12-17, 2000.
DOI : 10.1109/MC.2000.839316

J. Nazario, Political DDoS: Estonia and Beyond (Invited Talk, 17th USENIX Security Symposium, 2008.

T. Peng, C. Leckie, and K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, vol.39, issue.1, p.3, 2007.
DOI : 10.1145/1216370.1216373

. Miercom, Enterprise Firewall: Lab Test Summary Report, 2008.

T. Peng, C. Leckie, and K. Ramamohanarao, Information sharing for distributed intrusion detection systems, Journal of Network and Computer Applications, vol.30, issue.3, pp.877-899, 2007.
DOI : 10.1016/j.jnca.2005.07.004

T. Peng, C. Leckie, and K. Ramamohanarao, Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring, NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, pp.771-782, 2004.
DOI : 10.1007/978-3-540-24693-0_63

T. Peng, C. Leckie, and K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, Proceeding of the 38th IEEE International Conference on Communications, 2003.

T. Peng, C. Leckie, and K. Ramamohanarao, System and Process For Detecting Anomalous Network Traffic, 2008.

J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash crowds and denial of service attacks, Proceedings of the eleventh international conference on World Wide Web , WWW '02, pp.207-215, 2002.
DOI : 10.1145/511446.511485

P. Barford and D. Plonka, Characteristics of network traffic flow anomalies, Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement , IMW '01, 2001.
DOI : 10.1145/505202.505211

T. M. Gil and M. Poletto, MULTOPS: A data-structure for bandwidth attack detection Protecting servers against DDoS attacks with improved source IP address monitoring scheme, Proceedings of 10th Usenix Security Symposium 2nd Conference on Next Generation Internet Design and Engineering ( NGI '06, 2001.

Q. Le, M. Zhanikeev, and Y. Tanaka, Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks, 2007 Next Generation Internet Networks, 2007.
DOI : 10.1109/NGI.2007.371212

W. Lee, S. J. Stolfo, and K. W. Mok, Adaptive Intrusion Detection: A Data Mining Approach Artificial Intelligence Review, pp.533-567, 2000.

W. Lee and S. J. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, issue.4, pp.227-261, 2000.
DOI : 10.1145/382912.382914

W. Lee, Real time data mining-based intrusion detection DISCEX '01 Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks, DARPA Information Survivability Conference & Exposition II Proc. 23rd National Information Systems Security Conf, 2000.

X. Xu, Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction, International Journal of Web Services Practices, vol.2, issue.20, pp.49-58, 2006.

A. Moosa and E. M. Alsaffar, Proposing a hybrid-intelligent framework to secure e-government web applications ACM: Cairo, Egypt. 21. OpenBSD. PF: The OpenBSD Packet Filter Available from: http://www.openbsd.org/faq/pf/. 22. OpenBSD. OpenBSD Programmer's Manual: ioctl -control device Available from: http://www.openbsd.org/cgi-bin/man.cgi?query= ioctl&sektion=2&arch=&apropos=0&manpath=OpenBSD+4.6. 23. OpenBSD. OpenBSD System Manager's Manual: pfctl -control the packet filter (PF) device, Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008.

R. Barnett, . Modsecurity-core-rule, and . Set, Available from: http://www.owasp.org/index.php/File:OWASP_ModSecurity_Core_Rule_Se t.ppt. 25. ModSecurity. ModSecurity Open Source Web Application Firewall Available from Research on Intrusion Detection and Response: A Survey, International Journal of Network Security, vol.1, issue.2, pp.84-102, 2005.

A. G. Tartakovsky, A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods, IEEE Transactions on Signal Processing, vol.54, issue.9, pp.3372-3382, 2006.
DOI : 10.1109/TSP.2006.879308

E. Ahmed, A. Clark, and G. Mohay, Effective Change Detection in Large Repositories of Unsolicited Traffic, 2009 Fourth International Conference on Internet Monitoring and Protection, 2009.
DOI : 10.1109/ICIMP.2009.8

E. Ahmed, A. Clark, G. Mohay, and J. , A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed, IFIP International Conference on Network and Parallel Computing 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, pp.168-175, 2007.