메뉴 건너뛰기




Volumn 2820, Issue , 2003, Pages 155-172

Characterizing the performance of network intrusion detection sensors

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COSTS; MERCURY (METAL); NETWORK ARCHITECTURE; PIPELINE PROCESSING SYSTEMS;

EID: 35248869269     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45248-5_9     Document Type: Article
Times cited : (38)

References (24)
  • 1
    • 0027541468 scopus 로고
    • A High-performance Network Architecture for a PA-RISC Workstation
    • Feb.
    • D. Banks and M. Prudence, "A High-performance Network Architecture for a PA-RISC Workstation", IEEE Journal on Selected Areas in Communications, vol. 11, no. 2, Feb. 1993, pp. 191-202.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.2 , pp. 191-202
    • Banks, D.1    Prudence, M.2
  • 8
    • 1542492179 scopus 로고    scopus 로고
    • Trapeze/IP: TCP/IP at Near-Gigabit Speeds
    • Usenix Assoc., Berkeley, Calif.
    • A. Gallatin, J. Chase, and K. Yocum, "Trapeze/IP: TCP/IP at Near-Gigabit Speeds", Proc. 1999 Usenix Technical Conference, Usenix Assoc., Berkeley, Calif., 1999, pp. 109-120.
    • (1999) Proc. 1999 Usenix Technical Conference , pp. 109-120
    • Gallatin, A.1    Chase, J.2    Yocum, K.3
  • 10
    • 0003278283 scopus 로고    scopus 로고
    • The Microarchitecture of the Pentium 4 Processor
    • Q1
    • G. Hinton et al, "The Microarchitecture of the Pentium 4 Processor," Intel Technology Journal, Q1 2001.
    • (2001) Intel Technology Journal
    • Hinton, G.1
  • 13
    • 0001087280 scopus 로고    scopus 로고
    • Hyper-Threading Technology Architecture and Microarchitecture
    • February
    • D. Marr et al., "Hyper-Threading Technology Architecture and Microarchitecture", Intel Technology Journal, vol. 6, no. 1, February 2002, pp. 4-15.
    • (2002) Intel Technology Journal , vol.6 , Issue.1 , pp. 4-15
    • Marr, D.1
  • 14
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, no. 23-24, 1999, pp. 2435-2463.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 18
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight Intrusion Detection for Networks
    • November
    • M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," Proc. Usenix LISA '99 Conf., November 1999. http://www.snort.org/docs/lisapaper.txt
    • (1999) Proc. Usenix LISA '99 Conf.
    • Roesch, M.1
  • 21
    • 2442505048 scopus 로고    scopus 로고
    • whitepaper, Sourcefire Network Security Inc
    • "Snort 2.0 - Detection Revisited," whitepaper, Sourcefire Network Security Inc, 2002.
    • (2002) Snort 2.0 - Detection Revisited
  • 23
    • 0028386367 scopus 로고
    • A Systematic Approach to Host Interface Design for High-Speed Networks
    • March
    • P. Steenkiste, "A Systematic Approach to Host Interface Design for High-Speed Networks", IEEE Computer, vol. 27, no. 3, March 1994, pp. 47-57.
    • (1994) IEEE Computer , vol.27 , Issue.3 , pp. 47-57
    • Steenkiste, P.1
  • 24
    • 0002619341 scopus 로고    scopus 로고
    • Lmbench: Portable Tools for Performance Analysis
    • Usenix Assoc., Berkeley, Calif.
    • L. McVoy, C. Staelin, "lmbench: Portable Tools for Performance Analysis," Proc. USENIX Ann. Technical Conference, Usenix Assoc., Berkeley, Calif., 1998, pp. 279-294.
    • (1998) Proc. USENIX Ann. Technical Conference , pp. 279-294
    • McVoy, L.1    Staelin, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.