메뉴 건너뛰기




Volumn , Issue , 2004, Pages 302-309

The LoSS technique for detecting new denial of service attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTER SOFTWARE; ELECTRONIC MAIL; NETWORK PROTOCOLS; SECURITY OF DATA; SERVERS; WEBSITES;

EID: 2442583303     PISSN: 10910050     EISSN: 1558058X     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (18)
  • 2
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • Apr
    • Steven Bellovin. "Security problems in the TCP/IP protocol suite", Computer Communications Review, 19(2), Apr 1989.
    • (1989) Computer Communications Review , vol.19 , Issue.2
    • Bellovin, S.1
  • 6
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in World Wide Web traffic: Evidence and possible causes
    • Dec
    • Mark Crovella and Azer Bestavros. "Self-similarity in World Wide Web traffic: Evidence and possible causes", IEEE-ACM Transactions on Networking, 5(6), Dec 1997.
    • (1997) IEEE-ACM Transactions on Networking , vol.5 , Issue.6
    • Crovella, M.1    Bestavros, A.2
  • 8
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • Apr
    • Lee Garber. "Denial-of-Service attacks rip the internet", IEEE Computer, Apr 2000.
    • (2000) IEEE Computer
    • Garber, L.1
  • 9
    • 33644961664 scopus 로고    scopus 로고
    • 1999 DARPA intrusion detection evaluation: Design and procedures
    • Massachusetts Institute of Technology
    • Joshua Haines, Robert Lippmann, David Fried, et al. "1999 DARPA intrusion detection evaluation: Design and procedures", Lincoln Laboratory Technical Report 1062, Massachusetts Institute of Technology, 2001.
    • (2001) Lincoln Laboratory Technical Report , vol.1062
    • Haines, J.1    Lippmann, R.2    Fried, D.3
  • 13
    • 84964555718 scopus 로고    scopus 로고
    • Decision analysis of network-based intrusion detection systems for denial-of-service attacks
    • Ming Li, Weija Jia, and Wei Zhao. "Decision analysis of network-based intrusion detection systems for denial-of-service attacks", In Proceedings, IEEE Conferences on Info-tech and Infonet, 2001.
    • (2001) Proceedings, IEEE Conferences on Info-tech and Infonet
    • Li, M.1    Jia, W.2    Zhao, W.3
  • 14
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Richard Lippmann, Joshua Haines, David Fried, et al. "The 1999 DARPA off-line intrusion detection evaluation", Computer Networks, 34, 2000.
    • (2000) Computer Networks , vol.34
    • Lippmann, R.1    Haines, J.2    Fried, D.3
  • 15
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
    • Nov.
    • John McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Transactions on Information and Systems Security, Nov. 2000
    • (2000) ACM Transactions on Information and Systems Security
    • McHugh, J.1
  • 16
    • 0028491368 scopus 로고
    • Empirically-derived analytic models of wide-area TCP connections
    • Aug
    • Vern Paxson. "Empirically-derived analytic models of wide-area TCP connections", IEEE-ACM Transactions on Networking, 2(4), Aug 1994.
    • (1994) IEEE-ACM Transactions on Networking , vol.2 , Issue.4
    • Paxson, V.1
  • 17
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of Poisson modeling
    • June
    • Vern Paxson and Sally Floyd. "Wide-area traffic: The failure of Poisson modeling", IEEE-ACM Transactions on Networking, 3(3), June 1995.
    • (1995) IEEE-ACM Transactions on Networking , vol.3 , Issue.3
    • Paxson, V.1    Floyd, S.2
  • 18
    • 0035246057 scopus 로고    scopus 로고
    • Online error detection through observation of traffic self-similarity
    • Feb
    • W. Schleifer and M. Mannle. "Online error detection through observation of traffic self-similarity", IEE Proceedings on Communications, 148(1), Feb 2001.
    • (2001) IEE Proceedings on Communications , vol.148 , Issue.1
    • Schleifer, W.1    Mannle, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.