메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 716-722

IFTS: Intrusion forecast and traceback based on union defense environment

Author keywords

[No Author keywords available]

Indexed keywords

COOPERATIVE CAPABILITY; INTRUSION DETECTION SYSTEMS (IDS); NETWORK TRAFFIC; NETWORK-BASED INTRUSION DETECTION SYSTEMS (NIDS);

EID: 23944482464     PISSN: 15219097     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPADS.2005.170     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 1
    • 0242408742 scopus 로고    scopus 로고
    • Systems, "Artificial intelligent techniques for intrusion detection", 2003
    • Oct. vol.2
    • S. Mukkamala and A.H. Sung; Systems, "Artificial intelligent techniques for intrusion detection", 2003. IEEE International Conference on Man and Cybernetics, Volume: 2, Oct. 2003 Pages: 1266-1271 vol.2
    • (2003) IEEE International Conference on Man and Cybernetics , vol.2 , pp. 1266-1271
    • Mukkamala, S.1    Sung, A.H.2
  • 3
    • 0036947597 scopus 로고    scopus 로고
    • Single-packet IP traceback
    • Dec.
    • Snoeren A. C. et al., "Single-Packet IP Traceback," IEEE/ACM Trans. Net., vol. 10, no. 6, Dec. 2002, pp. 721-34.
    • (2002) IEEE/ACM Trans. Net. , vol.10 , Issue.6 , pp. 721-734
    • Snoeren, A.C.1
  • 4
    • 0042308614 scopus 로고    scopus 로고
    • On IP traceback
    • IEEE, July
    • A.Belenky and N. Ansar.;" On IP traceback", Communications Magazine, IEEE, Volume: 41, Issue: 7, July 2003 ,pp. 142-153
    • (2003) Communications Magazine , vol.41 , Issue.7 , pp. 142-153
    • Belenky, A.1    Ansar, N.2
  • 6
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • Oct.
    • R.K.C. Chang; "Defending against flooding-based distributed denial-of-service attacks: a tutorial", IEEE Communications Magazine, Volume: 40, Issue: 10, Oct. 2002, pp. 42-51
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 7
    • 4143086429 scopus 로고    scopus 로고
    • ICMP traceback messages
    • S. M. Bellovin, "ICMP Traceback Messages," IETF draft, 2000;http://www.research.att.com/smb/papers/draftbellovin-itrace-00.txt.
    • (2000) IETF Draft
    • Bellovin, S.M.1
  • 8
    • 0035361712 scopus 로고    scopus 로고
    • Network support for IP traceback
    • June
    • S. Savage et al., "Network Support for IP Traceback," IEEE/ACM Trans. Net., vol. 9, no. 3, June 2001, pp. 226-37.
    • (2001) IEEE/ACM Trans. Net. , vol.9 , Issue.3 , pp. 226-237
    • Savage, S.1
  • 9
    • 85084163540 scopus 로고    scopus 로고
    • Centertrack: An IP overlay network for tracking DoS floods
    • R. Stone, "Centertrack: An IP Overlay Network for Tracking DoS Floods," Proc. 9th USENIX Sec. Symp., 2000,pp. 199-212.
    • (2000) Proc. 9th USENIX Sec. Symp. , pp. 199-212
    • Stone, R.1
  • 10
    • 84962214242 scopus 로고    scopus 로고
    • Deciduous: Decentralized source identification for network-based intrusions
    • H.Y. Chang et al., "Deciduous: Decentralized Source Identification for Network-Based Intrusions," Proc. 6th IFIP/IEEE Int'l. Symp. Integrated Net. Mgmt., 1999,pp.701-714.
    • (1999) Proc. 6th IFIP/IEEE Int'l. Symp. Integrated Net. Mgmt. , pp. 701-714
    • Chang, H.Y.1
  • 11
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. USENIX LISA, 2000, pp. 319-27.
    • (2000) Proc. USENIX LISA , pp. 319-327
    • Burch, H.1    Cheswick, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.