메뉴 건너뛰기




Volumn 29, Issue 6, 2006, Pages 944-951

A data-mining based DoS detection technique

Author keywords

Association algorithm; Cluster algorithm; DoS (Denial of Service) attack; Real time detection

Indexed keywords

ALGORITHMS; AVAILABILITY; INTERNET;

EID: 33746497836     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (14)
  • 1
    • 0345302842 scopus 로고    scopus 로고
    • Chinese source. Beijing: China Machine Press
    • Skoudies. Counter Hack. Beijing: China Machine Press, 2002 (in Chinese)
    • (2002) Counter Hack
    • Skoudies1
  • 2
    • 33746567240 scopus 로고    scopus 로고
    • CERT/CC Coordination Center. Trends in Denial of Service Attack Technology
    • CERT/CC Coordination Center. Trends in Denial of Service Attack Technology. October 2001
    • (2001)
  • 3
    • 1642375563 scopus 로고    scopus 로고
    • Adaptive model generation: An architecture for the deployment of data miningbased intrusion detection systems
    • Kluwer
    • Honig A., Howard A., Eskin E., Stolfo S.. Adaptive model generation: An architecture for the deployment of data miningbased intrusion detection systems. Data Mining for Security Applications, Kluwer, 2002
    • (2002) Data Mining for Security Applications
    • Honig, A.1    Howard, A.2    Eskin, E.3    Stolfo, S.4
  • 6
    • 33746558025 scopus 로고    scopus 로고
    • Detection and summarization of novel network attacks using data mining
    • Technical Report
    • Ertoz L., Eilertson E., Lazarevic A., Tan P., Dokas P., Srivastava J., Kumar. Detection and summarization of novel network attacks using data mining. Technical Report, 2003
    • (2003)
    • Ertoz, L.1    Eilertson, E.2    Lazarevic, A.3    Tan, P.4    Dokas, P.5    Srivastava, J.6    Kumar7
  • 7
    • 33746531087 scopus 로고    scopus 로고
    • The 1999 DARPA Intrusion Detection Evaluation Data set, Information Systems Technology Group of MIT Lincoln Laboratory
    • The 1999 DARPA Intrusion Detection Evaluation Data set, Information Systems Technology Group of MIT Lincoln Laboratory, http://www.ll.mit.edu/IST/ideval/data/data_index.html
  • 9
    • 4544229404 scopus 로고    scopus 로고
    • ADAM: Detecting intrusions by data mining
    • Workshop on Information Assurance and Security
    • Barbara D.. ADAM: Detecting intrusions by data mining. In: Proceedings of the 2001 IEEE. Workshop on Information Assurance and Security, 2001
    • (2001) Proceedings of the 2001 IEEE
    • Barbara, D.1
  • 11
    • 18144414087 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks using source ip address monitoring, draft
    • Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao. Detecting distributed denial of service attacks using source ip address monitoring, draft, 2002
    • (2002)
    • Tao, P.1    Leckie, C.2    Ramamohanarao, K.3
  • 12
    • 33244458508 scopus 로고    scopus 로고
    • Data mining methods for network intrusion detection
    • Technique Report, UC davis
    • Brugger S. T.. Data mining methods for network intrusion detection. Technique Report, UC davis, 2004
    • (2004)
    • Brugger, S.T.1
  • 13
    • 33746477455 scopus 로고    scopus 로고
    • The apriori program source code
    • Christian Borgelt. The apriori program source code. http://fuzzy.cs.uni-magdeburg.de/-borgelt/, 2002
    • (2002)
    • Borgelt, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.