메뉴 건너뛰기




Volumn , Issue , 2004, Pages 565-571

Detecting Grid-Abuse Attacks by Source-based Monitoring

Author keywords

[No Author keywords available]

Indexed keywords

DISCRIMINANT ANALYSIS; NETWORK SECURITY;

EID: 33751114535     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 1
    • 0037001741 scopus 로고    scopus 로고
    • Towards the Scalable Implementation of a User Level Anomaly Detection System
    • Anaheim, CA, October
    • R. Chinchani, S. Upadhyaya, and K. Kwiat, "Towards the Scalable Implementation of a User Level Anomaly Detection System, " IEEE MIL-COM 2002, Anaheim, CA, October 2002.
    • (2002) IEEE MIL-COM 2002
    • Chinchani, R.1    Upadhyaya, S.2    Kwiat, K.3
  • 3
    • 0031153727 scopus 로고    scopus 로고
    • Globus:A Metacomput-ing Infrastructure Toolkit
    • L Foster, C. Kesselman, "Globus:A Metacomput-ing Infrastructure Toolkit, " Intl J. Supercomputer Applications, Vol. 11, No. 2, pp 115-128, 1997.
    • (1997) Intl J. Supercomputer Applications , vol.11 , Issue.2 , pp. 115-128
    • Foster, L1    Kesselman, C.2
  • 7
    • 33646828290 scopus 로고    scopus 로고
    • Trust Models and NetShield Architecture for Securing Grid Computing
    • submitted to the Kluwer Academic Publisher, May
    • K. Hwang, S. Tanachaiwiwat, "Trust Models and NetShield Architecture for Securing Grid Computing, " submitted to the Journal of Grid Computing, Kluwer Academic Publisher, May 2003.
    • (2003) Journal of Grid Computing
    • Hwang, K.1    Tanachaiwiwat, S.2
  • 8
    • 0038021028 scopus 로고    scopus 로고
    • A Comparative Study on Feature Selection and Classification Methods Using Gene Expression Proteomics and Proteomic Patterns
    • H. Liu, J. Li, L. Wong, "A Comparative Study on Feature Selection and Classification Methods Using Gene Expression Proteomics and Proteomic Patterns, " Genome Informatics No. 13, pp 51-06, 2002.
    • (2002) Genome Informatics , Issue.13 , pp. 51-06
    • Liu, H.1    Li, J.2    Wong, L.3
  • 9
    • 84904888755 scopus 로고    scopus 로고
    • Attacking DDoS at the Source
    • Paris, France, November
    • J. Mirkovic, G. Prier, P. Reiher, "Attacking DDoS at the Source, " In Proc. of ICNP 2002, pp 312-321, Paris, France, November 2002.
    • (2002) Proc. of ICNP 2002 , pp. 312-321
    • Mirkovic, J.1    Prier, G.2    Reiher, P.3
  • 10
    • 72849120951 scopus 로고    scopus 로고
    • Source-End DDoS Defense
    • April 2003, Cambridge, Massachusette
    • J. Mirkovic, G. Prier, P. Reiher, "Source-End DDoS Defense, " In Proc. of NCA 2003, pp 171-178, April 2003, Cambridge, Massachusette
    • In Proc. of NCA 2003 , pp. 171-178
    • Mirkovic, J.1    Prier, G.2    Reiher, P.3
  • 11
    • 85133014878 scopus 로고    scopus 로고
    • Detection of Denial-of-QoS Attacks Based on x2 Statistic and EWMA Control Charts
    • January
    • V. A. Mahadik, X. Wu, D. S. Reeves, "Detection of Denial-of-QoS Attacks Based on x2 Statistic and EWMA Control Charts, " USENIX Secu-rity502, January 2002.
    • (2002) USENIX Secu-rity502
    • Mahadik, V. A.1    Wu, X.2    Reeves, D. S.3
  • 14
    • 0002341107 scopus 로고    scopus 로고
    • Mutual Information in Learning Feature Transformations
    • Stanford, CA, June 29-July 2
    • K. Torkkola, W. Campbell, "Mutual Information in Learning Feature Transformations, " In Proc. of ICML 2000, Stanford, CA, pp 1015-1022 June 29-July 2, 2000.
    • (2000) Proc. of ICML 2000 , pp. 1015-1022
    • Torkkola, K.1    Campbell, W.2
  • 17
    • 0036864028 scopus 로고    scopus 로고
    • EWMA Techniques for Computer Intrusion Detection through Anomalous Changes in Event Intensity
    • N. Ye, C. Borror, and Y. Zhang, "EWMA Techniques for Computer Intrusion Detection through Anomalous Changes in Event Intensity, " Quality and Reliability Engineering International, Vol. 18, No. 6, pp 443-451, 2002.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.6 , pp. 443-451
    • Ye, N.1    Borror, C.2    Zhang, Y.3
  • 18
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • July
    • N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection, " IEEE Transactions on Computers, Vol. 51. No. 7, pp 810-820, July 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S. M.2    Chen, Q.3    Vilbert, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.