메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 244-251

Flow based observations from NETI@home and honeynet data

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER WORMS; DATA PROCESSING; LEARNING SYSTEMS; PACKET NETWORKS; SCANNING; TELECOMMUNICATION TRAFFIC; USER INTERFACES; WORLD WIDE WEB;

EID: 33745449214     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2005.1495959     Document Type: Conference Paper
Times cited : (7)

References (14)
  • 1
    • 33745460714 scopus 로고    scopus 로고
    • March
    • "NETI@home." http://www.neti.gatech.edu, March 2005.
    • (2005) NETI@home
  • 4
    • 0002593233 scopus 로고
    • Assigned numbers
    • October
    • J. Reynolds and J. Postel, "Assigned numbers," October 1994. RFC 1700.
    • (1994) RFC , vol.1700
    • Reynolds, J.1    Postel, J.2
  • 5
    • 33745474440 scopus 로고    scopus 로고
    • March
    • "nmap." http://www.insecure.org/nmap/, March 2005.
    • (2005) nmap
  • 6
    • 33745449655 scopus 로고    scopus 로고
    • March
    • "nessus." http://www.nessus.org/, March 2005.
    • (2005) nessus
  • 11
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • C. Shannon and D. Moore, "The spread of the witty worm," Security & Privacy Magazine, vol. 2, no. 4, pp. 46-50, 2004.
    • (2004) Security & Privacy Magazine , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 13
    • 33745456593 scopus 로고    scopus 로고
    • March
    • "Telescope analysis - caida." http://www.caida.org/analysis/ security/telescope, March 2005.
    • (2005) Telescope Analysis - Caida


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.