메뉴 건너뛰기




Volumn E82-D, Issue 4, 1999, Pages 784-792

Detecting malicious activities through port profiling

Author keywords

Auditing; Intrusion detection; Network surveillance; Profiling

Indexed keywords

INTERNET PROTOCOL; INTRUSION DETECTION; NETWORK SECURITY MONITOR; NETWORK SURVEILLANCE; PORT PROFILING; TRANSMISSION CONTROL PROTOCOL;

EID: 0033329099     PISSN: 09168532     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (22)
  • 3
    • 0002738343 scopus 로고
    • Security problem in the TCP/IP protocol suite
    • April
    • S.M. Bellovin, "Security problem in the TCP/IP protocol suite," Comput. Commun., vol.19, no.2, pp.32-48, April 1989.
    • (1989) Comput. Commun. , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 5
    • 0343036497 scopus 로고    scopus 로고
    • CERT Advisory CA-96:01, Feb.
    • "UDP Service Denial," CERT Advisory CA-96:01, Feb. 1996.
    • (1996) UDP Service Denial
  • 6
    • 0003877387 scopus 로고    scopus 로고
    • CERT Advisory CA-96:21, Sept. 19
    • "TCP SYN flooding," CERT Advisory CA-96:21, Sept. 19, 1996.
    • (1996) TCP SYN Flooding
  • 7
    • 85085159424 scopus 로고
    • Network (in) security through IP packet filtering
    • Baltimore, MD, Sept.
    • D.B. Chapman, "Network (in) security through IP packet filtering," Proc. 3rd USENIX Unix Security Symposium, Baltimore, MD, Sept. 1992.
    • (1992) Proc. 3rd USENIX Unix Security Symposium
    • Chapman, D.B.1
  • 9
    • 0007655160 scopus 로고    scopus 로고
    • Information-gathering with mobile agents for intrusion detection system
    • May
    • M. Asaka, "Information-gathering with mobile agents for intrusion detection system," IEICE Trans., vol.J81-D-I, no.5, pp.532-539, May 1998.
    • (1998) IEICE Trans. , vol.J81-D-I , Issue.5 , pp. 532-539
    • Asaka, M.1
  • 10
  • 12
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May/June
    • B. Mukherjee, L.T. Heberlein, and K.N. Levitt, "Network intrusion detection," IEEE Network, vol.8, no.3, pp.26-41, May/June 1994.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 15
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Maryland, Oct.
    • P.A. Porras and P.G. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," Proc. National Information System Security Conference, pp.353-365, Maryland, Oct. 1997.
    • (1997) Proc. National Information System Security Conference , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 16
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • D.E. Denning, "An intrusion-detection model," IEEE Trans. Software Eng., vol.SE-13, no.2, pp.222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 17
    • 0004118981 scopus 로고
    • The NIDES Statistical Component: Description and Justification
    • SRI International, California, March
    • U.S. Javitz and A. Valdes, "The NIDES Statistical Component: Description and Justification," Technical Report, SRI International, California, March 1994.
    • (1994) Technical Report
    • Javitz, U.S.1    Valdes, A.2
  • 20
    • 52649126844 scopus 로고    scopus 로고
    • CERT Advisory CA-97:27, Dec. 10
    • "FTP Bounce," CERT Advisory CA-97:27, Dec. 10, 1997.
    • (1997) FTP Bounce
  • 21
    • 85040762249 scopus 로고    scopus 로고
    • Problems with the FTP PORT Command
    • Feb. 13
    • "Problems with the FTP PORT Command," CERT Technical Tips, Feb. 13, 1998.
    • (1998) CERT Technical Tips


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.