메뉴 건너뛰기




Volumn 13, Issue 5, 2005, Pages 779-806

One step ahead to multisensor data fusion for DDoS detection

Author keywords

Anomaly detection; Data fusion; Denial of Service attacks; Security

Indexed keywords

BANDWIDTH; COMPUTER CRIME; EXPERT SYSTEMS; NEURAL NETWORKS; SECURITY OF DATA; TELECOMMUNICATION LINKS; TELECOMMUNICATION TRAFFIC;

EID: 28844473551     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13505     Document Type: Conference Paper
Times cited : (19)

References (69)
  • 8
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • T. Bass, Intrusion detection systems and multisensor data fusion. Communications of the ACM 43(4) (2000), 99-105.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 11
    • 1642535783 scopus 로고    scopus 로고
    • A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods
    • R. Blazek, H. Kim, B. Rozovskii and A. Tartakovsky, A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods, in: IEEE Workshop on Information Assurance and Security, 2001, pp. 220-226.
    • (2001) IEEE Workshop on Information Assurance and Security , pp. 220-226
    • Blazek, R.1    Kim, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 18
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • Division of Engineering and Applied Science Harvard University
    • C.-M. Cheng, H. Kung and K.-S. Tan, Use of spectral analysis in defense against DoS attacks, in: Proceedings of IEEE GLOBECOM, Division of Engineering and Applied Science Harvard University, 2002.
    • (2002) Proceedings of IEEE GLOBECOM
    • Cheng, C.-M.1    Kung, H.2    Tan, K.-S.3
  • 19
    • 85039355361 scopus 로고    scopus 로고
    • CISCO, Netflow, http://www.cisco.com/go/netflow.
    • Netflow
  • 22
  • 27
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Karlsruhe, Germany
    • C. Estan, S. Savage and G. Varghese, Automatically inferring patterns of resource consumption in network traffic, in : Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, 2003.
    • (2003) Proceedings of the ACM SIGCOMM Conference
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 30
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • USENIX, ed., Washington, DC, USA, Berkeley, CA, USA, USENIX
    • T.M. Gil and M. Poletto, MULTOPS: A data-structure for bandwidth attack detection, in: Proceedings of the 10th USENIX Security Symposium, 2001, USENIX, ed., Washington, DC, USA, Berkeley, CA, USA, USENIX, 2001.
    • (2001) Proceedings of the 10th USENIX Security Symposium, 2001
    • Gil, T.M.1    Poletto, M.2
  • 32
    • 0028543366 scopus 로고
    • Training feedforward networks with the Marquardt algorithm
    • M.T. Hagan and M. Menhaj, Training feedforward networks with the Marquardt algorithm, IEEE Transactions on Neural Networks 5(6) (1994), 989-993.
    • (1994) IEEE Transactions on Neural Networks , vol.5 , Issue.6 , pp. 989-993
    • Hagan, M.T.1    Menhaj, M.2
  • 34
    • 33947521742 scopus 로고    scopus 로고
    • Identification of repeated attack scenarios using network traffic forensics
    • USC/Information Sciences Institute, August
    • A. Hussain, J. Heidemann and C. Papadopoulos, Identification of repeated attack scenarios using network traffic forensics, Technical Report ISI-TR-2003-577, USC/Information Sciences Institute, August 2003.
    • (2003) Technical Report , vol.ISI-TR-2003-577
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 40
    • 3543088029 scopus 로고    scopus 로고
    • Detecting network attacks in the internet via statistical network traffic normality prediction
    • Special Issue: Security and Management
    • J. Jiang and S. Papavassiliou, Detecting network attacks in the internet via statistical network traffic normality prediction, Journal of Network and Systems Management 12 (March) (2004), 51-72. Special Issue: Security and Management.
    • (2004) Journal of Network and Systems Management , vol.12 , Issue.MARCH , pp. 51-72
    • Jiang, J.1    Papavassiliou, S.2
  • 43
    • 0012882330 scopus 로고
    • Theory of evidence - A survey of its mathematical foundations, applications and computational analysis
    • J. Kohlas and P. Monney, Theory of evidence - a survey of its mathematical foundations, applications and computational analysis, ZOR - Mathematical Methods of Operations Research 39 (1994), 35-68.
    • (1994) ZOR - Mathematical Methods of Operations Research , vol.39 , pp. 35-68
    • Kohlas, J.1    Monney, P.2
  • 44
    • 0013347997 scopus 로고    scopus 로고
    • Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics
    • Dec.
    • A. Kukarni, S. Bush and S. Evans, Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics, GE CRD Technical Report 2001 CRD176, Dec. 2001.
    • (2001) GE CRD Technical Report 2001 , vol.CRD176
    • Kukarni, A.1    Bush, S.2    Evans, S.3
  • 45
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM 2001, 2001.
    • (2001) Proceedings of ACM SIGCOMM 2001
    • Lee, H.1
  • 48
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • ISSN: 0163-6804
    • C. Manikopoulos and S. Papavassiliou, Network intrusion and fault detection: a statistical anomaly approach, IEEE Communications Magazine 40 (Oct.) (2002), 76-82. Issue: 10, ISSN: 0163-6804.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 OCT. , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 49
    • 84872132631 scopus 로고    scopus 로고
    • Mazu Networks, White papers, http://www.mazunetworks.com/solutions/ white_papers/.
    • White Papers
  • 50
    • 84904888755 scopus 로고    scopus 로고
    • Attacking DDoS at the source
    • Paris, France
    • J. Mirkovic, G. Prier and P. Reiher, Attacking DDoS at the source, in: Proceedings of ICNP, Paris, France, 2002, pp. 312-321.
    • (2002) Proceedings of ICNP , pp. 312-321
    • Mirkovic, J.1    Prier, G.2    Reiher, P.3
  • 55
    • 24644432749 scopus 로고    scopus 로고
    • Proactively detecting DDoS attack using source IP address monitoring
    • Athens, Greece
    • T. Peng, C. Leckie and R. Kotagiri, Proactively detecting DDoS attack using source IP address monitoring, in: Networking 2004, Athens, Greece, 2004.
    • (2004) Networking 2004
    • Peng, T.1    Leckie, C.2    Kotagiri, R.3
  • 57
    • 84890503292 scopus 로고
    • Application of sampling methodologies to network traffic characterization
    • G.C. Polyzos, H. Werner Braun and K.C. Claffy, Application of sampling methodologies to network traffic characterization, in: ACM SIGCOMM, 1993, pp. 194-203.
    • (1993) ACM SIGCOMM , pp. 194-203
    • Polyzos, G.C.1    Braun, H.W.2    Claffy, K.C.3
  • 63
    • 2442505788 scopus 로고    scopus 로고
    • Towards multisensor data fusion for DoS detection
    • Nicosia, Cyprus
    • C. Siaterlis and B. Maglaris, Towards multisensor data fusion for DoS detection, in: Proceedings of ACM SAC '04, Nicosia, Cyprus, 2004.
    • (2004) Proceedings of ACM SAC '04
    • Siaterlis, C.1    Maglaris, B.2
  • 67
    • 0344289821 scopus 로고    scopus 로고
    • Fuzzy information approaches to equipment condition monitoring and diagnosis
    • IEEE Press
    • K. Tomsovic and B. Baer, Fuzzy information approaches to equipment condition monitoring and diagnosis, Electric Power Applications of Fuzzy Systems, IEEE Press, 1998, pp. 59-84.
    • (1998) Electric Power Applications of Fuzzy Systems , pp. 59-84
    • Tomsovic, K.1    Baer, B.2
  • 68
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Society, Piscataway, NJ, USA
    • H. Wang, D. Zhang and K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Society, Volume 3 of Proceedings IEEE INFOCOM 2002, Piscataway, NJ, USA, 2002, pp. 1530-1539.
    • (2002) Proceedings IEEE INFOCOM 2002 , vol.3 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.