메뉴 건너뛰기




Volumn 24, Issue 10, 2006, Pages 1877-1887

Adaptive defense against various network attacks

Author keywords

Adaptive defense; Computer security; Distributed denial of service (DDoS); Internet worm; SYN flood

Indexed keywords

ADAPTIVE DEFENSE; DISTRIBUTED DENIAL-OF-SERVICE (DDOS); INTERNET WORM; SYN FLOOD;

EID: 33749830235     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2006.877137     Document Type: Article
Times cited : (26)

References (25)
  • 1
    • 84859682953 scopus 로고    scopus 로고
    • [Online]
    • CERT, CERT/CC advisories. [Online], Available: http://www.cert.org/ advisories/
  • 2
    • 0842304838 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Aug.
    • T. M. Gil and M. Poletto, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. USENIX Security Symp., Aug. 2002, pp. 23-38.
    • (2002) Proc. USENIX Security Symp. , pp. 23-38
    • Gil, T.M.1    Poletto, M.2
  • 4
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed DDoS traffic
    • Oct.
    • C. Jin, H. Wang, and K. G. Shin, "Hop-count filtering: An effective defense against spoofed DDoS traffic," in Proc. 10th ACM Conf. Comput. Commun. Security, Oct. 2003, pp. 30-41.
    • (2003) Proc. 10th ACM Conf. Comput. Commun. Security , pp. 30-41
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 8
    • 1242287724 scopus 로고    scopus 로고
    • A framework for classifying denial of service attacks
    • Aug.
    • A. Keromytis, V. Misra, and D. Rubenstein, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM, Aug. 2003, pp. 99-110.
    • (2003) Proc. ACM SIGCOMM , pp. 99-110
    • Keromytis, A.1    Misra, V.2    Rubenstein, D.3
  • 9
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Aug.
    • H. Kim and B. Karp, "Autograph : Toward automated, distributed worm signature detection," in Proc. 13th USENIX Security Symp., Aug. 2004, pp. 271-286.
    • (2004) Proc. 13th USENIX Security Symp. , pp. 271-286
    • Kim, H.1    Karp, B.2
  • 10
    • 8344261545 scopus 로고    scopus 로고
    • Packetscore: Statistical-based overload control against distributed denial-of-service attacks
    • Mar.
    • Y. Kim, W. Lau, M. Chuah, and H. Chao, "Packetscore: Statistical-based overload control against distributed denial-of-service attacks," in Proc. IEEE INFOCOM, Mar. 2004, pp. 2594-2604.
    • (2004) Proc. IEEE INFOCOM , pp. 2594-2604
    • Kim, Y.1    Lau, W.2    Chuah, M.3    Chao, H.4
  • 11
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok, "Toward cost-sensitive modeling for intrusion detection and response," J. Comput. Security, vol. 10, no. 1, 2, pp. 5-22, 2002.
    • (2002) J. Comput. Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 12
    • 25844492549 scopus 로고    scopus 로고
    • On the effectiveness of ddos attacks on statistical filtering
    • Mar.
    • Q. Li, E.-C. Chang, and M. Chan, "On the effectiveness of ddos attacks on statistical filtering," in Proc. IEEE INFOCOM, Mar. 2005, pp. 1373-1383.
    • (2005) Proc. IEEE INFOCOM , pp. 1373-1383
    • Li, Q.1    Chang, E.-C.2    Chan, M.3
  • 14
  • 16
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • Mar.
    • D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Proc. IEEE INFOCOM, Mar. 2003, pp. 1901-1910.
    • (2003) Proc. IEEE INFOCOM , pp. 1901-1910
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 19
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • to be published
    • S. Staniford, "Containment of scanning worms in enterprise networks," J. Comput. Security, to be published.
    • J. Comput. Security
    • Staniford, S.1
  • 21
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • Jun.
    • H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, Jun. 2002, pp. 1530-1539.
    • (2002) Proc. IEEE INFOCOM , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 24
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat mobile malicious code
    • Dec.
    • M. M. Williamson, "Throttling viruses: Restricting propagation to defeat mobile malicious code," in Proc. 18th Annu. Comput. Security Appl. Conf., Dec. 2002, pp. 61-68.
    • (2002) Proc. 18th Annu. Comput. Security Appl. Conf. , pp. 61-68
    • Williamson, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.