메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 89-104

The use of packet inter-arrival times for investigating unsolicited internet traffic

Author keywords

[No Author keywords available]

Indexed keywords

DATA ACQUISITION; DATA STRUCTURES; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; TELECOMMUNICATION TRAFFIC;

EID: 33847225917     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SADFE.2005.26     Document Type: Conference Paper
Times cited : (11)

References (24)
  • 2
    • 17844404852 scopus 로고    scopus 로고
    • Malicious bots threaten network security
    • D. Geer. Malicious bots threaten network security. IEEE Computer, 38(1):18-20, 2005.
    • (2005) IEEE Computer , vol.38 , Issue.1 , pp. 18-20
    • Geer, D.1
  • 5
    • 1642516070 scopus 로고    scopus 로고
    • The Honeypot Project: Trapping the Hackers
    • Lance Spitzner. The Honeypot Project: Trapping the Hackers. IEEE Security and Privacy, 1:15, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , pp. 15
    • Spitzner, L.1
  • 10
    • 28044457069 scopus 로고    scopus 로고
    • Network Telescopes
    • Technical Report
    • David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Network Telescopes: Technical Report, http://www.caida.org/outreach/papers/2004/ tr-2004-04/tr-2004-04.pdf, 2004.
    • (2004)
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 14
    • 33847178273 scopus 로고    scopus 로고
    • Internet Storm Center
    • Internet Storm Center, http://isc.sans.org/about.php.
  • 20
    • 33847212035 scopus 로고    scopus 로고
    • Home
    • The Leurre.com Home Page, http://www.leurrecom.org.
    • The Leurre.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.