메뉴 건너뛰기




Volumn 3224, Issue , 2004, Pages 146-165

On the design and use of internet sinks for network abuse monitoring

Author keywords

Deception systems; Honeypots; Intrusion detection

Indexed keywords

COMPUTER SYSTEM FIREWALLS; INTERNET; INTERNET PROTOCOLS; MERCURY (METAL);

EID: 35048867316     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30143-1_8     Document Type: Article
Times cited : (60)

References (33)
  • 1
    • 33745293149 scopus 로고    scopus 로고
    • The Use of Information Retrieval Techniques for Intrusion Detection
    • R. Anderson and A. Khattak. The Use of Information Retrieval Techniques for Intrusion Detection. In Proceedings of RAID, September 1998.
    • (1998) Proceedings of RAID, September
    • Anderson, R.1    Khattak, A.2
  • 2
    • 84862470783 scopus 로고    scopus 로고
    • Network Associates. LovGate Virus Summary. http://vil.nai.com/vil/ content/Print100183.htm, 2002.
    • (2002) LovGate Virus Summary
  • 3
    • 84862474039 scopus 로고    scopus 로고
    • C. Bullard. Argus Open Project.
    • C. Bullard. Argus Open Project. http://www.qosient.com/argus/.
  • 5
    • 84862474150 scopus 로고    scopus 로고
    • E-eye. Analysis: Sasser Worm. http://www.eeye.com/html/Research/ Advisories/AD20040501.html.
    • Analysis: Sasser Worm.
  • 6
    • 0141440878 scopus 로고    scopus 로고
    • New Directions in Traffic Measurement and Accounting
    • Pittsburgh, PA, August
    • C. Estan and G. Varghese. New Directions in Traffic Measurement and Accounting. In Proceedings of ACM SIGCOMM '02, Pittsburgh, PA, August 2002.
    • (2002) Proceedings of ACM SIGCOMM '02
    • Estan, C.1    Varghese, G.2
  • 22
    • 84862475026 scopus 로고    scopus 로고
    • D. Plonka. Flawed Routers Flood University of Wisconsin Internet Time Server
    • D. Plonka. Flawed Routers Flood University of Wisconsin Internet Time Server. http://www.cs.wisc.edu/plonka/netgear-sntp.
  • 28
    • 0003515847 scopus 로고    scopus 로고
    • Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns
    • H.S. Teng, K. Chen, and S. C-Y Lu. Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. In IEEE Symposium on Security and Privacy, 1999.
    • (1999) IEEE Symposium on Security and Privacy
    • Teng, H.S.1    Chen, K.2    Lu, S.C.-Y.3
  • 29
    • 84862475027 scopus 로고    scopus 로고
    • The Honeynet Project
    • The Honeynet Project, http://project.honeynet.org.
  • 30
    • 84862481359 scopus 로고    scopus 로고
    • Trend Micro. WORM_RBOT.CC. http://uk.trendmicro-europe.com/enterprise/ security-info/ve.detail.php?Vname=WORM.RBOT.CC.
    • WORM_RBOT.CC.
    • Micro, T.1
  • 31
    • 85137546697 scopus 로고    scopus 로고
    • Global Intrusion Detection in the DOMINO Overlay System
    • San Diego, CA
    • V. Yegneswaran, P. Barford, and S. Jha. Global Intrusion Detection in the DOMINO Overlay System. In Proceedings of NDSS, San Diego, CA, 2004.
    • (2004) Proceedings of NDSS
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.