메뉴 건너뛰기




Volumn , Issue , 2004, Pages 774-775

Modeling networking protocols to test Intrusion Detection Systems

Author keywords

[No Author keywords available]

Indexed keywords

FTP; INTRUSION DETECTION SYSTEM; MODELING; TRAFFIC ANALYSIS;

EID: 20544457472     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 1
    • 0035416013 scopus 로고    scopus 로고
    • Difficulties in simulating the internet
    • Aug
    • Floyd, S. and Paxson, V., "Difficulties in Simulating the Internet," Networking, IEEE/ACM Transactions on, Vol.9, Iss.4, Pages:392-403, Aug 2001.
    • (2001) Networking, IEEE/ACM Transactions on , vol.9 , Issue.4 , pp. 392-403
    • Floyd, S.1    Paxson, V.2
  • 2
    • 85029864069 scopus 로고
    • Analysis, modeling and generation of self-similar VBR video traffic
    • Sep.
    • M. Garret and W. Willinger, "Analysis, Modeling and Generation of Self-similar VBR video traffic," Proc, SICCOMM '94, pp. 269-280, Sep. 1994.
    • (1994) Proc, SICCOMM '94 , pp. 269-280
    • Garret, M.1    Willinger, W.2
  • 3
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • Dec.
    • M. Crovella and A. Bestavros, "Self-similarity in World Wide Web traffic: Evidence and Possible Causes," IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 835-846, Dec. 1997.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.1    Bestavros, A.2
  • 4
    • 85013592037 scopus 로고
    • Self-similarity through high-variability statistical analysis of ethernet LAN traffic at the source level
    • W. Willinger, M. Taqqu, R. Sherman and D. Wilson, "Self-similarity through High-variability Statistical Analysis of Ethernet LAN Traffic at the Source Level," Proc. SIGCOMM '95, pp. 100-113, 1995.
    • (1995) Proc. SIGCOMM '95 , pp. 100-113
    • Willinger, W.1    Taqqu, M.2    Sherman, R.3    Wilson, D.4
  • 5
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • June
    • V. Paxson and S. Floyd, "Wide-area traffic: the Failure of Poisson Modeling," IEEE/ACM Transaction on Networking, vol. 3, no. 3, pp. 226-224, June 1995.
    • (1995) IEEE/ACM Transaction on Networking , vol.3 , Issue.3 , pp. 226-1224
    • Paxson, V.1    Floyd, S.2
  • 6
    • 0001832102 scopus 로고
    • Using renewal processes to generate long-range dependence and high variability
    • E. Eberlein and M. S. Taqqu, Eds. Birkhauser
    • M. S. Taqqu and J. B. Levy, "Using Renewal Processes to Generate Long-range Dependence and High Variability," in Dependence in Probability and Statistics, E. Eberlein and M. S. Taqqu, Eds. Birkhauser, pp. 73-90, 1986.
    • (1986) Dependence in Probability and Statistics , pp. 73-90
    • Taqqu, M.S.1    Levy, J.B.2
  • 10
    • 2442421953 scopus 로고    scopus 로고
    • Generating Realistic Network Traffic for Security Experiments
    • Proceedings
    • Song Luo and Gerald A. Marin, "Generating Realistic Network Traffic for Security Experiments," IEEE Southeast Con 2004. Proceedings, Pages: 200- 207, 2004.
    • (2004) IEEE Southeast Con 2004 , pp. 200-207
    • Luo, S.1    Marin, G.A.2
  • 11
    • 84860941442 scopus 로고    scopus 로고
    • RFC1579, http://www.ietf.org/rfc/rfc1579.txt
    • RFC , vol.1579
  • 12
    • 0028491368 scopus 로고
    • Empirically derived analytic models of wide-area TCP connections
    • Aug.
    • V. Paxson, "Empirically Derived Analytic Models of Wide-area TCP Connections," Networking, IEEE/ACM Transactions on, Volume: 2 Issue: 4, Aug. 1994, Page(s): 316-336.
    • (1994) Networking, IEEE/ACM Transactions on , vol.2 , Issue.4 , pp. 316-336
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.