메뉴 건너뛰기




Volumn 23, Issue 10, 2005, Pages 1983-1993

Quality-of-protection (QoP) - An online monitoring and self-protection mechanism

Author keywords

Abnormality distance (AD); Network attack; Proactive defense; Quality of protection (QoP)

Indexed keywords

ABNORMALITY DISTANCE; NETWORK ATTACK; ONLINE MONITORING; PROACTIVE DEFENSE; QUALITY OF PROTECTION (QOP);

EID: 27644564187     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2005.854122     Document Type: Article
Times cited : (22)

References (59)
  • 1
    • 0034721164 scopus 로고    scopus 로고
    • The Internet's achilles' heel: Error and attack tolerance of complex networks
    • R. Albert, H. Jeong, and A. László Barabási, "The Internet's Achilles' Heel: Error and Attack Tolerance of Complex Networks," Nature, pp. 406:378-382, 2000.
    • (2000) Nature , pp. 406
    • Albert, R.1    Jeong, H.2    Barabási, A.L.3
  • 2
    • 0003964874 scopus 로고
    • Next-generation intrusion detection expert system (NIDES): A summary
    • Computer Science Laboratory, SRI International, Menlo Park, CA
    • D. Anderson, T. Frivold, and A. Valdes, "Next-generation intrusion detection expert system (NIDES): A summary," Computer Science Laboratory, SRI International, Menlo Park, CA, Tech. Rep. SRI-CSL-95-07, 1995.
    • (1995) Tech. Rep. , vol.SRI-CSL-95-07
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 3
    • 0004075434 scopus 로고    scopus 로고
    • ICMP traceback message
    • draft-bellovin-itrace-00.txt
    • S. M. Bellovin, "ICMP Traceback Message," Internet Draft, draft-bellovin-itrace-00.txt, 2000.
    • (2000) Internet Draft
    • Bellovin, S.M.1
  • 7
    • 0003209840 scopus 로고
    • Integrated services in the Internet architecture: An overview
    • IETF
    • R. Braden, D. Clark, and S. Shenker, "Integrated services in the Internet architecture: An overview," IETF, RFC 1633, 1994.
    • (1994) RFC , vol.1633
    • Braden, R.1    Clark, D.2    Shenker, S.3
  • 9
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • C. Ko, G. Fink, and K. Levitt, "Automated detection of vulnerabilities in privileged programs by execution monitoring," in Proc. 10th Annu. Conf. Comput. Security Applicat., 1994, pp. 134-144.
    • (1994) Proc. 10th Annu. Conf. Comput. Security Applicat. , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 11
    • 0004135984 scopus 로고    scopus 로고
    • IDIOT - Users guide
    • COAST Lab., Purdue Univ., West Lafayette, IN
    • M. Crosbie, B. Dole, T. Ellis, I. Krsul, and E. Spafford, "IDIOT - Users guide," COAST Lab., Purdue Univ., West Lafayette, IN, Tech. Rep. TR-96-050, 1996.
    • (1996) Tech. Rep. , vol.TR-96-050
    • Crosbie, M.1    Dole, B.2    Ellis, T.3    Krsul, I.4    Spafford, E.5
  • 13
    • 84954439087 scopus 로고    scopus 로고
    • Autonomia: An autonomic computing environment
    • Apr.
    • X. Dong et al., "Autonomia: An autonomic computing environment," in Proc. Int. Conf. Comput. Commun., Apr. 2003, pp. 61-68.
    • (2003) Proc. Int. Conf. Comput. Commun. , pp. 61-68
    • Dong, X.1
  • 16
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • IETF
    • P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing," IETF, RFC 2267, 1998.
    • (1998) RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 18
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Aug.
    • T. M. Gil and M. Poletter, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. USENIX Security Symp., Aug. 2001.
    • (2001) Proc. USENIX Security Symp.
    • Gil, T.M.1    Poletter, M.2
  • 20
    • 4544270125 scopus 로고    scopus 로고
    • Impact analysis of faults and attacks in large-scale networks
    • Sep./Oct.
    • S. Hariri, G. Qu, T. Dharmagadda, and R. Modukuri, "Impact analysis of faults and attacks in large-scale networks," IEEE Security and Privacy, vol. 1, no. 5, pp. 49-54, Sep./Oct. 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.5 , pp. 49-54
    • Hariri, S.1    Qu, G.2    Dharmagadda, T.3    Modukuri, R.4
  • 21
    • 0027593257 scopus 로고
    • Nadir: An automated system for detecting network intrusion and misuse
    • J. Hochberg et al., "Nadir: An automated system for detecting network intrusion and misuse," Comput. Security, vol. 12, no. 3, pp. 235-248, 1993.
    • (1993) Comput. Security , vol.12 , Issue.3 , pp. 235-248
    • Hochberg, J.1
  • 24
    • 85180745018 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • San Diego, CA, Feb.
    • J. Ioannidis and S. M. Bellovin, "Implementing pushback: Router-based defense against DDoS attacks," in Proc. NDSS, San Diego, CA, Feb. 2002.
    • (2002) Proc. NDSS
    • Ioannidis, J.1    Bellovin, S.M.2
  • 26
    • 0035359901 scopus 로고    scopus 로고
    • Automatic feature extraction of waveform signals for in-process diagnostic performance improvement
    • J. Jin and J. Shi, "Automatic feature extraction of waveform signals for in-process diagnostic performance improvement," J. Intell. Manuf, vol. 12, pp. 257-268, 2001.
    • (2001) J. Intell. Manuf , vol.12 , pp. 257-268
    • Jin, J.1    Shi, J.2
  • 28
    • 25844457130 scopus 로고    scopus 로고
    • Recommended Internet service provider security services and procedures
    • IETF
    • T. Killalea, "Recommended Internet service provider security services and procedures," IETF, RFC 3013, 2000.
    • (2000) RFC , vol.3013
    • Killalea, T.1
  • 29
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Mar.
    • K. Ilgun, A. R. Kemmerer, and A. P. Porras, "State transition analysis: A rule-based intrusion detection approach," IEEE Trans. Softw. Eng., vol. 21, no. 3, pp. 181-199, Mar. 1995.
    • (1995) IEEE Trans. Softw. Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, A.R.2    Porras, A.P.3
  • 31
  • 32
    • 84888897029 scopus 로고    scopus 로고
    • [Online]
    • (2003) Slammer Worm. Matrix. [Online]. Available: http://www. matrixnetsystems.com/ea/2003/20 030 130.jsp
    • (2003) Slammer Worm. Matrix
  • 33
    • 4544272175 scopus 로고    scopus 로고
    • Controlling high bandwidth aggregates in the network
    • Jul.
    • R. Manajan et al., "Controlling high bandwidth aggregates in the network," in ACM SIGCOMM Comput. Commun. Revi., Jul. 2002, 32(3).
    • (2002) ACM SIGCOMM Comput. Commun. Revi. , vol.32 , Issue.3
    • Manajan, R.1
  • 36
    • 84888892425 scopus 로고    scopus 로고
    • [Online]
    • McAfee Security. (2004). McAfee virusscan real-time virus protection. [Online]. Available: http://us.mcafee.com/root/package.asp?pkgid=100&cid= 9052
    • (2004) McAfee Virusscan Real-time Virus Protection
  • 41
    • 84888911501 scopus 로고    scopus 로고
    • Quantifying vulnerabilities in the networked environment: Methods and uses
    • C. Sample and I. Poynter, "Quantifying vulnerabilities in the networked environment: Methods and uses," in Proc. TISC2000/S9, 2000.
    • (2000) Proc. TISC2000/S9
    • Sample, C.1    Poynter, I.2
  • 46
    • 84888910839 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Mar.
    • D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. ACM SIGCOMM, Mar. 2001.
    • (2001) Proc. ACM SIGCOMM
    • Song, D.1    Perrig, A.2
  • 47
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP overlay network for tracking DoS floods
    • Denver, CO, Aug.
    • R. Stone, "CenterTrack: An IP overlay network for tracking DoS floods," in Proc. 9th USENIX Security Symp., Denver, CO, Aug. 2000, pp.199-212.
    • (2000) Proc. 9th USENIX Security Symp. , pp. 199-212
    • Stone, R.1
  • 50
    • 1042267106 scopus 로고    scopus 로고
    • A graph-based network-vulnerability analysis system
    • Sandia Nat. Lab.
    • L. P. Swiler, C. Phillips, and T. Gaylor, "A Graph-Based Network-Vulnerability Analysis System," Sandia Rep. SAND97-3010/1, Sandia Nat. Lab., vol. 31, pp. 517-527, 1998.
    • (1998) Sandia Rep. SAND97-3010/1 , vol.31 , pp. 517-527
    • Swiler, L.P.1    Phillips, C.2    Gaylor, T.3
  • 53
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • New York, Jun.
    • H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, New York, Jun. 2002, pp. 1530-1539.
    • (2002) Proc. IEEE INFOCOM , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 54
    • 84888892472 scopus 로고    scopus 로고
    • [Online]
    • DoS attack. [Online]. Available: http://www.webopedia.com/TERM/ D/DoS_attack.html
    • DoS Attack
  • 55
    • 0038404196 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Miami Beach, FL, May
    • D. Yau, J. Liu, and F. Liang, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles," in Proc. IWQoS, Miami Beach, FL, May 2002, pp. 35-44.
    • (2002) Proc. IWQoS , pp. 35-44
    • Yau, D.1    Liu, J.2    Liang, F.3
  • 57
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems
    • N. Ye and Q. Chen, "An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems," Qual. Reliab. Eng. J., vol. 17, pp. 105-112, 2001.
    • (2001) Qual. Reliab. Eng. J. , vol.17 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 58
    • 0003750241 scopus 로고    scopus 로고
    • An architecture for intrusion detection using autonomous agents
    • COAST Lab., Purdue Univ., West Lafayette, IN, IN 47907-1398
    • D. Zamboni et al., "An architecture for intrusion detection using autonomous agents," COAST Lab., Purdue Univ., West Lafayette, IN, Tech. Rep. 98/05, IN 47907-1398, 1998.
    • (1998) Tech. Rep. , vol.98 , Issue.5
    • Zamboni, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.