메뉴 건너뛰기




Volumn 15, Issue 1, 2007, Pages 14-25

On scalable attack detection in the network

Author keywords

Data structures; Denial of service; Network attacks; Routers; Scanning; Streaming algorithms; Syn flooding

Indexed keywords

COMPUTER CRIME; DATA STRUCTURES; NETWORK SECURITY; ROUTERS; SCANNING;

EID: 33947507304     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2006.890115     Document Type: Article
Times cited : (56)

References (48)
  • 1
    • 0742283589 scopus 로고    scopus 로고
    • Snort
    • [Online]. Available
    • M. Roesch, Snort. [Online]. Available: http://www.snort.org
    • Roesch, M.1
  • 4
    • 14844308379 scopus 로고    scopus 로고
    • "Containment of scanning worms in enterprise networks"
    • to be published
    • S. J. Staniford, "Containment of scanning worms in enterprise networks," J. Computer Security, 2004, to be published.
    • (2004) J. Computer Security
    • Staniford, S.J.1
  • 5
    • 33947524219 scopus 로고    scopus 로고
    • ForeScout Technologies. [Online]. Available
    • ForeScout Technologies. [Online]. Available: http://www.forescout.com
  • 7
    • 33947516390 scopus 로고    scopus 로고
    • Mazu Publishing. [Online]. Available
    • Mazu Publishing. [Online]. Available: http://www.mazu.com
  • 8
    • 33947518663 scopus 로고    scopus 로고
    • Arbor Networks. [Online]. Available
    • Arbor Networks. [Online]. Available: http://www.arbornetworks.com
  • 9
    • 0036343692 scopus 로고    scopus 로고
    • "Detecting SYN flooding attacks"
    • H. Wang, D. Zhang, and K. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, 2002, pp. 1530-1539.
    • (2002) Proc. IEEE INFOCOM , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.3
  • 10
    • 0033295259 scopus 로고    scopus 로고
    • "Bro: A system for detecting network intruders in realtime"
    • V. Paxson, "Bro: A system for detecting network intruders in realtime," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 12
    • 33947547005 scopus 로고    scopus 로고
    • "The Naptha DoS vulnerabilities"
    • [Online]. Available
    • R. Keyes, "The Naptha DoS vulnerabilities," [Online]. Available: http://www.cert.org/advisories/CA-2000-21.html
    • Keyes, R.1
  • 15
    • 33947508872 scopus 로고    scopus 로고
    • MyDoom.B Virus. [Online]. Available
    • MyDoom.B Virus. [Online]. Available: http://www.us-cert.gov/cas/ techalerts/TA04-028A.html
  • 16
    • 33947520221 scopus 로고    scopus 로고
    • "Code Red"
    • CERT Advisory CA-2001-19, Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, [Online]. Available
    • CERT Advisory CA-2001-19, "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, [Online]. Available: http://www.cert.org/advisories/CA-2001-19.html
  • 17
    • 33947505183 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-26 Nimda Worm, [Online]. Available
    • CERT Advisory CA-2001-26 Nimda Worm, [Online]. Available: http://www.cert.org/advisories/CA-2001-26.html
  • 18
    • 33947530508 scopus 로고    scopus 로고
    • CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, [Online]. Available
    • CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, [Online]. Available: http://www.cert.org/advisories/CA-1998-01.html
  • 19
    • 0003375670 scopus 로고    scopus 로고
    • "An analysis of using reflectors for distributed denial-of-service attacks"
    • Jul
    • V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks," Comput. Commun. Rev., vol. 31, no. 3, Jul. 2001.
    • (2001) Comput. Commun. Rev. , vol.31 , Issue.3
    • Paxson, V.1
  • 20
    • 85084163167 scopus 로고    scopus 로고
    • "MULTOPS: A data-structure for bandwidth attack detection"
    • T. M. Gill and M. Poletto, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. 10th USENIX Security Symp., 2001, pp. 23-38.
    • (2001) Proc. 10th USENIX Security Symp. , pp. 23-38
    • Gill, T.M.1    Poletto, M.2
  • 23
    • 0141440878 scopus 로고    scopus 로고
    • "New directions in traffic measurement and accounting"
    • C. Estan and G. Varghese, "New directions in traffic measurement and accounting," in Proc. ACM SIGCOMM, 2002, pp. 271-282.
    • (2002) Proc. ACM SIGCOMM , pp. 271-282
    • Estan, C.1    Varghese, G.2
  • 24
    • 14944380706 scopus 로고    scopus 로고
    • "Autofocus: A tool for automatic traffic analysis"
    • C. Estan and G. Varghese, "Autofocus: A tool for automatic traffic analysis," in Proc. ACM SIGCOMM, 2003, pp. 137-148.
    • (2003) Proc. ACM SIGCOMM , pp. 137-148
    • Estan, C.1    Varghese, G.2
  • 25
    • 33947493181 scopus 로고    scopus 로고
    • Cisco NetFlow. [Online]. Available
    • Cisco NetFlow. [Online]. Available: http://www.cisco.com/en/US/products/ ps6601/products_ios_protocol_group_home.html
  • 26
    • 0014814325 scopus 로고
    • "Space/time tradeoffs in hash coding with allowable errors"
    • Jul
    • B. H. Bloom, "Space/time tradeoffs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, Jul. 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 29
    • 33947511386 scopus 로고    scopus 로고
    • NMap. [Online]. Available
    • NMap. [Online]. Available: http://www.insecure.org/nmap
  • 30
    • 33947501830 scopus 로고    scopus 로고
    • Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available
    • Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available: http://www.caida.org
  • 31
    • 1242287724 scopus 로고    scopus 로고
    • "A framework for classifying denial of service attacks"
    • A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM, 2003, pp. 99-110.
    • (2003) Proc. ACM SIGCOMM , pp. 99-110
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 35
    • 33947525075 scopus 로고    scopus 로고
    • "Another new thought on dealing with SYN flooding"
    • [Online]. Available
    • E. Shenk, "Another new thought on dealing with SYN flooding," 1996 [Online]. Available: http://www.wcug.wwu.edu/lists/netdev/199609/ msg00171.html
    • (1996)
    • Shenk, E.1
  • 36
    • 33947502399 scopus 로고    scopus 로고
    • Riverhead Networks. [Online]. Available
    • Riverhead Networks. [Online]. Available: http://www.riverhead.com
  • 37
    • 0018456171 scopus 로고
    • "Universal classes of hash functions"
    • L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, no. 2, pp. 143-154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , Issue.2 , pp. 143-154
    • Carter, L.1    Wegman, M.N.2
  • 38
    • 3543097593 scopus 로고    scopus 로고
    • "SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks"
    • A. Yaar, A. Perrig, and D. Song, "SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks," in Proc. IEEE Symp. Security and Privacy, 2004, pp. 130-143.
    • (2004) Proc. IEEE Symp. Security and Privacy , pp. 130-143
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 39
    • 0037810705 scopus 로고    scopus 로고
    • "Pi: A path identification mechanism to defend against DDoS attacks"
    • A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against DDoS attacks," in Proc. IEEE Symp. Security and Privacy, 2003, pp. 93-107.
    • (2003) Proc. IEEE Symp. Security and Privacy , pp. 93-107
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 41
    • 14944374775 scopus 로고    scopus 로고
    • "SYN Cookies"
    • [Online]. Available
    • D. J. Bernstein, "SYN Cookies," 1997 [Online]. Available: http://cr.yp.to/syncookies.html
    • (1997)
    • Bernstein, D.J.1
  • 42
    • 3042859154 scopus 로고    scopus 로고
    • "Resisting syn flooding dos attacks with a syn cache"
    • J. Lemon, "Resisting syn flooding dos attacks with a syn cache," in Proc. USENIX BSDCon' 2002, pp. 89-98.
    • Proc. USENIX BSDCon'2002 , pp. 89-98
    • Lemon, J.1
  • 44
    • 33947522106 scopus 로고    scopus 로고
    • Netscreen Technologies. [Online]. Available
    • Netscreen Technologies. [Online]. Available: http://www.netscreen.com
  • 48
    • 33947511995 scopus 로고    scopus 로고
    • "Network security platforms will transform security markets"
    • [Online]. Available
    • J. Pescatore, M. Easley, and R. Stiennon, "Network security platforms will transform security markets," 2002 [Online]. Available: http://www.techrepublic.com/ article.jhtml?id=r00220021223jdt01.htm&src=bc
    • (2002)
    • Pescatore, J.1    Easley, M.2    Stiennon, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.