메뉴 건너뛰기




Volumn , Issue , 2007, Pages 100-108

Real-time analysis of flow data for network attack detection

Author keywords

Anomaly and attack detection; Flow analysis; Network monitoring

Indexed keywords

COMPUTER WORMS; DATA FLOW ANALYSIS; REAL TIME SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 34748852070     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INM.2007.374774     Document Type: Conference Paper
Times cited : (56)

References (38)
  • 10
    • 33847290520 scopus 로고    scopus 로고
    • Mining Anomalies Using Traffic Feature Distributions
    • Philadelphia, PA, USA, Aug
    • A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions," in Proc. of ACM SIGCOMM Conference, Philadelphia, PA, USA, Aug. 2005, pp. 217-228.
    • (2005) Proc. of ACM SIGCOMM Conference , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 16
    • 34748865376 scopus 로고    scopus 로고
    • Mar. 2000, Online, Available
    • M. Ruff, "White Paper XmlBlaster," Mar. 2000. [Online]. Available: http://www.xmlblaster.org/xmlBlaster/doc/whitepaper/whitepaper.html
    • White Paper XmlBlaster
    • Ruff, M.1
  • 17
    • 34748832808 scopus 로고    scopus 로고
    • SWITCH Homepage, http://www.switch.ch/, 2006.
    • SWITCH Homepage, http://www.switch.ch/, 2006.
  • 20
    • 34250635653 scopus 로고    scopus 로고
    • Home
    • Diadem Firewall Homepage, http://www.diadem-firewall.org/, 2006.
    • (2006) Diadem Firewall
  • 21
    • 34447308129 scopus 로고    scopus 로고
    • Internet-Draft, work in progress, draft-dressler-ipfix-aggregation-03.txt, June
    • F. Dressler, C. Sommer, and G. Münz, "IPFIX Aggregation," Internet-Draft, work in progress, draft-dressler-ipfix-aggregation-03.txt, June 2006.
    • (2006) IPFIX Aggregation
    • Dressler, F.1    Sommer, C.2    Münz, G.3
  • 29
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight Intrusion Detection for Networks
    • USENIX Association, Nov
    • M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," in Proc. of 13th USENDi Conference on System Administration. USENIX Association, Nov. 1999, pp. 229-238.
    • (1999) Proc. of 13th USENDi Conference on System Administration , pp. 229-238
    • Roesch, M.1
  • 30
    • 34250696219 scopus 로고    scopus 로고
    • Home
    • Netflow Monitor Homepage, http://netflow.cesnet.cz/, 2006.
    • (2006) Netflow Monitor
  • 31
    • 34748917712 scopus 로고    scopus 로고
    • History Project Home
    • History Project Homepage, http://www.history-praject.net/, 2006.
    • (2006)
  • 33
    • 34748838375 scopus 로고    scopus 로고
    • Ntop Homepage, http://www.ntop.org/, 2006.
    • Ntop Homepage, http://www.ntop.org/, 2006.
  • 38
    • 34748876515 scopus 로고    scopus 로고
    • Home
    • HowScan Homepage, http://www.caida.org/tools/utilities/flowscan/, 2006.
    • (2006) HowScan


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.