메뉴 건너뛰기




Volumn , Issue , 2004, Pages 187-200

On scalable attack detection in the network

Author keywords

Denial of Service; Scalability; Security

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; NETWORK PROTOCOLS; ROUTERS; SECURITY OF DATA; STATIC RANDOM ACCESS STORAGE;

EID: 14944386850     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1028788.1028812     Document Type: Conference Paper
Times cited : (60)

References (50)
  • 4
    • 84860101729 scopus 로고    scopus 로고
    • Mazu networks, http://www.mazu.com.
  • 5
    • 84860101881 scopus 로고    scopus 로고
    • Mydoom.b virus. http://www.us-cert.gov/cas/alerts/SA04-028A.html.
    • Mydoom.b Virus
  • 6
    • 84860093028 scopus 로고    scopus 로고
    • Sco inc. http://www.sco.com.
  • 7
    • 84860096401 scopus 로고    scopus 로고
    • ARBOR NETWORKS, http://www.arbornetworks.com.
  • 10
    • 0014814325 scopus 로고
    • Space/time tradeoffs in hash coding with allowable errors
    • July
    • BLOOM, B. H. Space/time tradeoffs in hash coding with allowable errors. Communications of the ACM 13, 7 (July 1970), 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 11
    • 0010053289 scopus 로고    scopus 로고
    • CHECK POINT SOFTWARE TECHNOLOGIES LTD. Syndefender. http://www. checkpoint.com/products/firewall-1.
    • Syndefender
  • 12
    • 14944363876 scopus 로고    scopus 로고
    • Estimating rarity and similarity over data stream windows
    • DIMACS, Nov.
    • DATAR, M., AND MUTHUKRISHNAN, S. Estimating rarity and similarity over data stream windows. Technical report, 2001-21, DIMACS, Nov. 2001.
    • (2001) Technical Report , vol.2001 , Issue.21
    • Datar, M.1    Muthukrishnan, S.2
  • 13
    • 4544360452 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting
    • Aug.
    • ESTAN, C., AND VARGHESE, G. New directions in traffic measurement and accounting. In ACM SIGCOMM (Aug. 2002).
    • (2002) ACM SIGCOMM
    • Estan, C.1    Varghese, G.2
  • 15
    • 84860105045 scopus 로고    scopus 로고
    • FORESCOUT TECHNOLOGIES, http://www.forescout.com.
  • 16
    • 84860105064 scopus 로고    scopus 로고
    • FYODOR, http://www.insecure.org/nmap.
  • 18
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • GILL, T. M., AND POLETTO, M. MULTOPS: a data-structure for bandwidth attack detection. In USENIX Security Symposium (2001).
    • (2001) USENIX Security Symposium
    • Gill, T.M.1    Poletto, M.2
  • 21
    • 14844316210 scopus 로고    scopus 로고
    • A framework for classifying denial of service attacks
    • Aug.
    • HUSSAIN, A., HEIDEMANN, J., AND PAPADOPOULOS, C. A framework for classifying denial of service attacks. In ACM SIGCOMM (Aug. 2003).
    • (2003) ACM SIGCOMM
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 28
    • 3042859154 scopus 로고    scopus 로고
    • Resisting syn flooding dos attacks with a syn cache
    • Feb.
    • LEMON, J. Resisting syn flooding dos attacks with a syn cache. In Proceedings of USENIX BSDCon'2002 (Feb. 2002).
    • (2002) Proceedings of USENIX BSDCon'2002
    • Lemon, J.1
  • 30
    • 84860105028 scopus 로고    scopus 로고
    • Snort
    • MARTIN ROESCH. Snort, http://www.snort.org.
    • Roesch, M.1
  • 33
    • 84860105029 scopus 로고    scopus 로고
    • NETFLOW, C. http://www.cisco.com/warp/public/732/Tech/netflow.
  • 34
    • 84860105030 scopus 로고    scopus 로고
    • NETSCREEN 100 FIREWALL APPLIANCE
    • NETSCREEN 100 FIREWALL APPLIANCE. http://www.netscreen.com.
  • 35
    • 84860103290 scopus 로고    scopus 로고
    • NETSCREEN TECHNOLOGIES, http://www.netscreen.com.
  • 36
    • 0031247411 scopus 로고    scopus 로고
    • End-to-end routing behavior in the internet
    • Oct.
    • PAXSON, V. End-to-end routing behavior in the internet. IEEE/ACM Transactions on Networking 5, 5 (Oct. 1997), 601-615.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.5 , pp. 601-615
    • Paxson, V.1
  • 37
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Dec.
    • PAXSON, V. Bro: A system for detecting network intruders in real-time. In Computer Networks, 31(23-24), pp. 2435-2463 (Dec. 1999).
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 38
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • July
    • PAXSON, V. An analysis of using reflectors for distributed denial-of-service attacks. In Computer Communication Review 31(3) (July 2001).
    • (2001) Computer Communication Review , vol.31 , Issue.3
    • Paxson, V.1
  • 44
    • 14944384392 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • Nov.
    • STANIFORD, S. J. Containment of scanning worms in enterprise networks. In Journal of Computer Security (Nov. 2003).
    • (2003) Journal of Computer Security
    • Staniford, S.J.1
  • 46
    • 14944370119 scopus 로고    scopus 로고
    • Syn-dog: Sniffing syn flooding sources
    • Vienna, Austria
    • WANG, H., ZHANG, D., AND SHIN, K. Syn-dog: Sniffing syn flooding sources. In IEEE ICDCS (Vienna, Austria, 2002).
    • (2002) IEEE ICDCS
    • Wang, H.1    Zhang, D.2    Shin, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.