메뉴 건너뛰기




Volumn 8, Issue 3, 1994, Pages 26-41

The Role of Customer-Premises Bandwidth Management: In the evolving era of high-speed wide-area networking, customer premises bandwidth management should offer economic advantages well into the future

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA COMMUNICATION SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 0028430224     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/65.283931     Document Type: Article
Times cited : (661)

References (36)
  • 1
    • 84944978730 scopus 로고
    • Trusted Computer System Evaluation Criteria, DOD 52D0.28-STD Orange Book Dec.
    • National Computer Security Center, Department of Defense, Trusted Computer System Evaluation Criteria, DOD 52D0.28-STD, Dec. 1985 (Orange Book).
    • (1985) National Computer Security Center, Department of Defense
  • 2
    • 84944986087 scopus 로고
    • Trusted Computer System Evaluation Criteria, DOD 5200.28-STD Red Book July
    • National Computer Security Center, Dept. of Defense, Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, July 1987 (Red Book).
    • (1987) National Computer Security Center, Dept. of Defense
  • 3
    • 0022090414 scopus 로고
    • Security in high-level network protocols
    • July
    • V. L. Vaydock and S. T. Kent, “Security in high-level network protocols,” IEEE Commun. Mag., vol. 23, no. 7, pp. 12–24, July 1985.
    • (1985) IEEE Commun. Mag. , vol.23 , Issue.7 , pp. 12-24
    • Vaydock, V.L.1    Kent, S.T.2
  • 4
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • D. E. Denning, “An intrusion-detection model,” IEEE Trans, on Software Engg., vol. SE-13, pp. 222–232, Feb. 1987.
    • (1987) IEEE Trans, on Software Engg. , vol.SE-13 , pp. 222-232
    • Denning, D.E.1
  • 13
    • 0039952570 scopus 로고
    • A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks
    • Washington, D.C. Oct.
    • J. R. Winkler, “A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks, “Proc. 13th National Computer Security Conference, Washington, D.C., Oct. 1990, 115–124.
    • (1990) Proc. 13th National Computer Security Conference , pp. 115-124
    • Winkler, J.R.1
  • 14
    • 2942645420 scopus 로고
    • Expert systems in intrusion detection: A case study
    • Baltimore, MD Oct.
    • M. M. Sebring et al., “Expert systems in intrusion detection: A case study,” Proc., 11th National Computer Security Conf., Baltimore, MD, Oct. 1988. [15] H. S. Vaccaro and G. E. Liepins, “Detection of anomalous computer session activity,” Proc., 1989 Symposium on Research in Security and Privacy, Oakland, CA, pp. 280–289, May 1989.
    • (1988) Proc., 11th National Computer Security Conf.
    • Sebring, M.M.1
  • 16
    • 0027593257 scopus 로고
    • NADIR: an automated system for detecting network intrusion and misuse
    • May
    • J. Hochberg et al., “NADIR: an automated system for detecting network intrusion and misuse,” Computers and Security, vol. 12, no. 3, pp. 235–248, May 1993.
    • (1993) Computers and Security , vol.12 , Issue.3 , pp. 235-248
    • Hochberg, J.1
  • 18
    • 84944988623 scopus 로고
    • personal communication
    • T. F. Lunt, personal communication, 1992.
    • (1992)
    • Lunt, T.F.1
  • 20
    • 0009016272 scopus 로고
    • An evening with berferd, in which a cracker is lured, endured, and studied
    • San Francisco Jan.
    • W. R. Cheswick, “An evening with berferd, in which a cracker is lured, endured, and studied,” Proc., Winter USENIX Conference, San Francisco, Jan. 1992.
    • (1992) Proc., Winter USENIX Conference
    • Cheswick, W.R.1
  • 21
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • Review, April
    • S. M. Bellovin, “Security problems in the TCP/IP protocol suite,” ACM Computer Commun. Review, vol. 19, no. 2, pp. 32–48, April 1989.
    • (1989) ACM Computer Commun. , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 24
    • 84944980222 scopus 로고
    • Signature Analysis and Communication Issues in a Distributed Intrusion Detection System
    • Division of Computer Science University of California, Davis Aug.
    • S. R. Snapp, Signature Analysis and Communication Issues in a Distributed Intrusion Detection System, M.S. thesis, Division of Computer Science, University of California, Davis, Aug. 1991.
    • (1991) M.S. thesis
    • Snapp, S.R.1
  • 25
    • 0242409064 scopus 로고
    • Intrusion Detection: The Application of Feature Selection, a Comparison of Algorithms, and the Application of a Wide Area Network Analyzer
    • Division of Computer Science, University of California, Davis August
    • J. Doak, Intrusion Detection: The Application of Feature Selection, a Comparison of Algorithms, and the Application of a Wide Area Network Analyzer, M.S. thesis, Division of Computer Science, University of California, Davis, August 1992.
    • (1992) M.S. thesis
    • Doak, J.1
  • 26
    • 84944988627 scopus 로고
    • Software toolkit for analysis research (STAR)
    • Los Alamos National Laborator Aug.
    • T. Burr, et al., “Software toolkit for analysis research (STAR),” Technical Report No. LA-12617-MS, Los Alamos National Laboratory, Aug. 1993.
    • (1993) Technical Report No. LA-12617-MS
    • Burr, T.1
  • 27
    • 84944988628 scopus 로고
    • Towards Detecting Intrusions in a Networked Environment
    • Division of Computer Science University of California, Davis June
    • L T. Heberlein, Towards Detecting Intrusions in a Networked Environment, M. S. thesis, Division of Computer Science, University of California, Davis, June 1991.
    • (1991) M. S. thesis
    • Heberlein, L.T.1
  • 28
    • 84944984133 scopus 로고
    • Towards detecting intrusions in a networked environment
    • Concord, CA May
    • L. T. Heberlein et al. “Towards detecting intrusions in a networked environment,” Proc., 14th DOE Conference on Computer Security, Concord, CA, May 1991, pp. 17–47 — 17–65.
    • (1991) Proc., 14th DOE Conference on Computer Security
    • Heberlein, L.T.1
  • 31
    • 0026402266 scopus 로고
    • A system for distributed intrusion detection
    • San Francisco, CA Feb.
    • S.R. Snappetal., “A system for distributed intrusion detection,” Proc., IEEE COMFCON 91, San Francisco, CA, Feb. 1991, pp. 170–176.
    • (1991) Proc., IEEE COMFCON 91 , pp. 170-176
    • Snappetal, S.R.1
  • 32
    • 0002473030 scopus 로고
    • DIDS (Distributed Intrusion Detection System) — Motivation, Architecture, and An Early Prototype
    • Washington, D.C. Oct.
    • S. R. Snapp et al., “DIDS (Distributed Intrusion Detection System) — Motivation, Architecture, and An Early Prototype,” Proc., 14th National Computer Security Conf., Washington, D.C., Oct. 1991.
    • (1991) Proc., 14th National Computer Security Conf.
    • Snapp, S.R.1
  • 34
    • 0027748352 scopus 로고
    • Analysis of an algorithm for distributed recognition and accountability
    • Fairfax, VA Nov.
    • C. Ko et al., “Analysis of an algorithm for distributed recognition and accountability,” Proc., First ACM Conf. on Computer and Communications Security, Fairfax, VA, pp. 154–164, Nov. 1993.
    • (1993) Proc., First ACM Conf. on Computer and Communications Security , pp. 154-164
    • Ko, C.1
  • 35
    • 0003111439 scopus 로고
    • Automated audit trail analysis and intrusion detection: A survey
    • Baltimore, MD Oct.
    • T. F. Lunt, “Automated audit trail analysis and intrusion detection: A survey,” Proc., 11th National Computer Security Conf., Baltimore, MD, Oct. 1988.
    • (1988) Proc., 11th National Computer Security Conf.
    • Lunt, T.F.1
  • 36
    • 3943073609 scopus 로고
    • System for Detecting Attacks on Distributed Computer Systems
    • Division of Computer Science, University of California, Davis Feb.
    • J. Brentano, An Expert System for Detecting Attacks on Distributed Computer Systems, M. S. Thesis, Division of Computer Science, University of California, Davis, Feb. 1991.
    • (1991) M. S. Thesis
    • Brentano, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.