메뉴 건너뛰기




Volumn 33, Issue 4, 2003, Pages 339-351

A High-level Programming Environment for Packet Trace Anonymization and Transformation

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); HIGH LEVEL LANGUAGES; NETWORK PROTOCOLS; PACKET SWITCHING; TELECOMMUNICATION TRAFFIC;

EID: 1242310066     PISSN: 01464833     EISSN: None     Source Type: Journal    
DOI: 10.1145/863993.863994     Document Type: Conference Paper
Times cited : (72)

References (22)
  • 1
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • August
    • S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3):186-205, August 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 4
    • 85039378123 scopus 로고
    • Report on statistical disclosure limitation methodology
    • Federal Committee on Statistical Methodology. Report on statistical disclosure limitation methodology (statistical policy working paper 22), 1994. http://www.fcsm.gov/working-papers/spwp22.html.
    • (1994) Statistical Policy Working Paper , vol.22
  • 5
    • 0003303268 scopus 로고    scopus 로고
    • BLT: Bi-layer tracing of HTTP and TCP/IP
    • May
    • A. Feldmann. BLT: Bi-layer tracing of HTTP and TCP/IP. In Proceedings of WWW-9, May 2000.
    • (2000) Proceedings of WWW-9
    • Feldmann, A.1
  • 6
  • 10
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • Lecture Notes in Computer Science. Springer-Verlag
    • R. Lippmann, S. Webster, and D. Stetson. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In Proceedings of Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • (2002) Proceedings of Recent Advances in Intrusion Detection , vol.2516
    • Lippmann, R.1    Webster, S.2    Stetson, D.3
  • 11
    • 0032178152 scopus 로고    scopus 로고
    • An extensible probe architecture for network protocol performance measurement
    • G. R. Malan and F. Jahanian. An extensible probe architecture for network protocol performance measurement. In Proceedings of ACM SIGCOMM, 1998.
    • (1998) Proceedings of ACM SIGCOMM
    • Malan, G.R.1    Jahanian, F.2
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real time
    • December
    • V. Paxson. Bro: A system for detecting network intruders in real time. Computer Networks, December 1999.
    • (1999) Computer Networks
    • Paxson, V.1
  • 18
    • 1242308063 scopus 로고    scopus 로고
    • Private communication
    • S. Savage. Private communication.
    • Savage, S.1
  • 20
    • 84862048963 scopus 로고    scopus 로고
    • WildPackets, Inc. EtherPeek. http://www.etherpeek.com/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.