메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Defending distributed systems against malicious intrusions and network anomalies

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION SYSTEM (ADS); INTERNET TRAFFIC DATAMINING; NETWORK-BASED INTRUSION DETECTION SYSTEMS (NIDS);

EID: 33746272228     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPS.2005.160     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 2
    • 4243137229 scopus 로고    scopus 로고
    • Cyber defense technology: Networking and evaluation
    • March
    • DETER and EMIST Projects, "Cyber Defense Technology: Networking and Evaluation", Communications of The ACM, March 2004, pp. 58 - 61.
    • (2004) Communications of the ACM , pp. 58-61
  • 4
    • 38949133378 scopus 로고    scopus 로고
    • GridSec: Grid security enforcement with trust integration over minimal VPN tunnels
    • submitted July
    • K. Hwang, S. Song, and J. Lv, "GridSec: Grid Security Enforcement with Trust Integration over Minimal VPN Tunnels", IEEE Computer, submitted July, 2004.
    • (2004) IEEE Computer
    • Hwang, K.1    Song, S.2    Lv, J.3
  • 6
    • 33746293423 scopus 로고    scopus 로고
    • A scalable set-union approach to pushing back DDoS attacks
    • submitted Nov.5
    • Y.K. Kwok, M. Cai, and K. Hwang, "A Scalable Set-Union Approach to Pushing Back DDoS Attacks", IEEE Symp. on Security and Privacy, submitted Nov.5, 2004.
    • (2004) IEEE Symp. on Security and Privacy
    • Kwok, Y.K.1    Cai, M.2    Hwang, K.3
  • 8
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • (TISSec)
    • W. Lee and S. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems", ACM Trans. Inf. and System Security (TISSec), 2000.
    • (2000) ACM Trans. Inf. and System Security
    • Lee, W.1    Stolfo, S.2
  • 9
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln lab evaluation data for network anomaly detection
    • Sept.
    • M. V. Mahoney and P. K. Chan. "An Analysis of the 1999 DARPA/ Lincoln Lab Evaluation Data for Network Anomaly Detection", Proc. of Int'l Symp. Recent Advances in Intrusion Detection, Sept. 2003.pp. 220-237.
    • (2003) Proc. of Int'l Symp. Recent Advances in Intrusion Detection , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 11
    • 0038282217 scopus 로고    scopus 로고
    • Modern intrusion detection, data mining, and degrees of attack guilt
    • Barbarà and Jajodia, eds. Kluwer Publishers, Boston
    • S. Noel, D. Wijesekera, and C. Youman, "Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt", in Applications of Data Mining in Computer Security, Barbarà and Jajodia, eds. Kluwer Publishers, Boston, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Noel, S.1    Wijesekera, D.2    Youman, C.3
  • 12
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intrusions in real time
    • San Antonio, TX.
    • V. Paxson, " Bro: A System for Detecting Network Intrusions in Real Time", Proc. of the Seventh USENIX Security Symposium, San Antonio, TX. 1998.
    • (1998) Proc. of the Seventh USENIX Security Symposium
    • Paxson, V.1
  • 13
    • 33847748360 scopus 로고    scopus 로고
    • Frequent episode rules for internet traffic analysis and anomaly detection
    • Cambridge, MA. September
    • M. Qin and K. Hwang. "Frequent Episode Rules for Internet Traffic Analysis and Anomaly Detection", Proc. of IEEE Network Computing and Applications, (NCA2004), Cambridge, MA. September 2004.
    • (2004) Proc. of IEEE Network Computing and Applications, (NCA2004)
    • Qin, M.1    Hwang, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.