메뉴 건너뛰기




Volumn , Issue , 2004, Pages 54-64

Toward understanding distributed blackhole placement

Author keywords

Blackhole monitoring; Blackhole placement; Computer worms; Globally scoped threats; Internet Motion Sensor; Network security

Indexed keywords

ALGORITHMS; COMPUTER WORMS; INTERFACES (COMPUTER); NETWORK PROTOCOLS; RESOURCE ALLOCATION; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 14944363571     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029618.1029627     Document Type: Conference Paper
Times cited : (81)

References (32)
  • 6
    • 84888919688 scopus 로고    scopus 로고
    • The Internet motion sensor: A distributed global scoped Internet threat monitoring system
    • University of Michigan, Electrical Engineering and Computer Science, July
    • Evan Cooke, Michael Bailey, David Watson, Farnam Jahanian, and Jose Nazario. The Internet motion sensor: A distributed global scoped Internet threat monitoring system. Technical Report CSE-TR-491-04, University of Michigan, Electrical Engineering and Computer Science, July 2004.
    • (2004) Technical Report , vol.CSE-TR-491-04
    • Cooke, E.1    Bailey, M.2    Watson, D.3    Jahanian, F.4    Nazario, J.5
  • 9
    • 1642364369 scopus 로고    scopus 로고
    • Route flap damping exacerbates internet routing convergence
    • Zhuoqing Morley Mao, Ramesh Govindan, George Varghese, and Randy Katz. Route Flap Damping Exacerbates Internet Routing Convergence. In Proc of ACM SIGCOMM, 2002.
    • (2002) Proc of ACM SIGCOMM
    • Mao, Z.M.1    Govindan, R.2    Varghese, G.3    Katz, R.4
  • 11
    • 14344253939 scopus 로고    scopus 로고
    • Network telescopes: Observing small or distant security events
    • San Francisco, CA, August 5-9
    • David Moore. Network telescopes: Observing small or distant security events. In 11th USENIX Security Symposium, Invited talk, San Francisco, CA, August 5-9 2002.
    • (2002) 11th USENIX Security Symposium, Invited Talk
    • Moore, D.1
  • 13
    • 14944381614 scopus 로고    scopus 로고
    • Network telescopes: Technical report
    • Cooperative Association for Internet Data Analysis - CAIDA
    • David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Network Telescopes: Technical Report. Technical report, Cooperative Association for Internet Data Analysis - CAIDA, 2004.
    • (2004) Technical Report
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 14
  • 17
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Vern Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 18
    • 14944377862 scopus 로고    scopus 로고
    • Honeyd - A virtual honeypot daemon
    • Hamburg, Germany, February
    • Niels Provos. Honeyd - A virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, February 2003.
    • (2003) 10th DFN-CERT Workshop
    • Provos, N.1
  • 20
    • 84888889262 scopus 로고    scopus 로고
    • June
    • SANS Institute. Internet storm center. http://isc.inoidents.org/, June 2004.
    • (2004)
  • 22
    • 0041534274 scopus 로고    scopus 로고
    • A snapshot of global Internet worm activity
    • Arbor Networks
    • Dug Song, Rob Malan, and Robert Stone. A snapshot of global Internet worm activity. Technical report, Arbor Networks, 2001.
    • (2001) Technical Report
    • Song, D.1    Malan, R.2    Stone, R.3
  • 24
    • 84888898889 scopus 로고    scopus 로고
    • The honeynet project, June
    • Lance Spitzner et al. The honeynet project. http://project.honeynet.org/, June 2004.
    • (2004)
    • Spitzner, L.1
  • 25
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP overlay network for tracking DoS floods
    • USENIX, editor, Berkeley, CA, USA, August 14-17. The USENIX Association
    • Robert Stone. CenterTrack: An IP overlay network for tracking DoS floods. In USENIX, editor, Proceedings of the 9th USENIX Security Symposium, pages 199-212, Berkeley, CA, USA, August 14-17 2000. The USENIX Association.
    • (2000) Proceedings of the 9th USENIX Security Symposium , pp. 199-212
    • Stone, R.1
  • 26
    • 84888904990 scopus 로고    scopus 로고
    • Symantec Corp. Linux.Slapper.Worm. http://securityresponse.Symantec.com/ avcenter/venc/data/linux.slapper.worra.html.
    • Linux.Slapper.Worm
  • 27
    • 84888914413 scopus 로고    scopus 로고
    • June
    • Team CYMRU. The darknet project. http://www.cymru.com/Darknet/index.html, June 2004.
    • (2004)
  • 28
    • 84888913210 scopus 로고    scopus 로고
    • University of Oregon. Route Views project. http://www.routeviews.org/.
  • 31
    • 14944341848 scopus 로고    scopus 로고
    • On the design and use of Internet sinks for network abuse monitoring
    • University of Wisconsin, Computer Science Department
    • Vinod Yegneswaran, Paul Barford, and Dave Plonka. On the design and use of Internet sinks for network abuse monitoring. Technical Report 1497, University of Wisconsin, Computer Science Department, 2004.
    • (2004) Technical Report , vol.1497
    • Yegneswaran, V.1    Barford, P.2    Plonka, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.