메뉴 건너뛰기




Volumn , Issue , 2007, Pages 9-

A comparison of SYN flood detection algorithms

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER CRIME; COMPUTER SCIENCE; DISTRIBUTED COMPUTER SYSTEMS; PARAMETER ESTIMATION;

EID: 35348813037     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIMP.2007.1     Document Type: Conference Paper
Times cited : (12)

References (8)
  • 3
    • 84858353210 scopus 로고    scopus 로고
    • CERT Coordination Center, Jul
    • CERT Coordination Center. CERT Advisory CA-2001-9 "Code Red" worm exploiting buffer overflow in IIS indexing service DLL. http://www.cert.org/advisories/CA-2001-19.html, Jul 2001.
    • (2001) CERT Advisory CA-2001-9 Code Red
  • 5
    • 14844303748 scopus 로고    scopus 로고
    • On the difficulty of scalably detecting network attacks
    • ACM SIGSAC, Oct
    • Kirill Levchenko, Ramamohan Paturi, and George Varghese. On the difficulty of scalably detecting network attacks. In Proc. of CCS. ACM SIGSAC, Oct 2004.
    • (2004) Proc. of CCS
    • Levchenko, K.1    Paturi, R.2    Varghese, G.3
  • 6
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • IEEE Communications Society
    • Vasilios A. Siris and Fotini Papagalou. Application of anomaly detection algorithms for detecting SYN flooding attacks. In Proc. of Globecom. IEEE Communications Society, 2004.
    • (2004) Proc. of Globecom
    • Siris, V.A.1    Papagalou, F.2
  • 7
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • IEEE Communications Society
    • Haining Wang, Danlu Zhang, and Kang G. Shin. Detecting SYN flooding attacks. In Proc. of INFOCOM. IEEE Communications Society, 2002.
    • (2002) Proc. of INFOCOM
    • Wang, H.1    Zhang, D.2    Shin, K.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.