메뉴 건너뛰기




Volumn 26, Issue 7-8, 2007, Pages 479-484

Mining TCP/IP packets to detect stepping-stone intrusion

Author keywords

Clustering; Intrusion detection; Network security; Partitioning; Round trip time; Stepping stone

Indexed keywords

CLUSTERING ALGORITHMS; DATA MINING; ERROR ANALYSIS; NETWORK SECURITY; PACKET NETWORKS; TRANSMISSION CONTROL PROTOCOL;

EID: 36549082411     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2007.07.001     Document Type: Article
Times cited : (34)

References (19)
  • 1
    • 36549029609 scopus 로고    scopus 로고
    • Bishop Mathew. UNIX security: threats and solutions. In: Invited talk given at the 1995 system administration, networking, and security conference, Washington, DC; April 1995.
  • 2
    • 0003794137 scopus 로고
    • Prentice Hall, Englewood Cliffs, NJ p. 211-3
    • Bertsekas D., and Gallager R. Data networks (1992), Prentice Hall, Englewood Cliffs, NJ p. 211-3
    • (1992) Data networks
    • Bertsekas, D.1    Gallager, R.2
  • 5
    • 36549045838 scopus 로고    scopus 로고
    • Garvey TD, Lunt TF. Model based intrusion detection. In: Proceedings of the 14th national computer security conference, Baltimore, MD; October 1991. p. 373-85.
  • 8
    • 0031632265 scopus 로고    scopus 로고
    • Li Qiong, Mills David L. On the long-range dependence of packet round-trip delays in Internet. In: Proceedings of international conference on communications (ICC'98), Atlanta, USA, No. 1; June 1998. p 1185-92.
  • 10
    • 0029323403 scopus 로고
    • Wide-area traffic: the failure of poisson modeling
    • Paxson V., and Floyd S. Wide-area traffic: the failure of poisson modeling. IEEE/ACM Trans Netw 3 (1995) 226-244
    • (1995) IEEE/ACM Trans Netw , vol.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 12
    • 0029232080 scopus 로고    scopus 로고
    • Staniford-Chen S, Heberlein L Todd. Holding intruders accountable on the Internet. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA; 1995. p. 39-49.
  • 13
    • 36549053379 scopus 로고    scopus 로고
    • Yoda K, Etoh H. Finding connection chain for tracing intruders. In: Proceedings of 6th European symposium on research in computer security (LNCS 1985), Toulouse, France; 2000. p. 31-42.
  • 14
    • 48049087759 scopus 로고    scopus 로고
    • Detecting long connecting chains of interactive terminal sessions
    • Springer Press, Zurich, Switzerland
    • Yung K.H. Detecting long connecting chains of interactive terminal sessions. RAID 2002 (October 2002), Springer Press, Zurich, Switzerland 1-16
    • (2002) RAID 2002 , pp. 1-16
    • Yung, K.H.1
  • 15
    • 77952908143 scopus 로고    scopus 로고
    • Yang Jianhua, Huang Shou-Hsuan Stephen. A real-time algorithm to detect long connection chains of interactive terminal sessions. In: Proceedings of 3rd international conference on information security (Infosecu'04), Shanghai, China; November 2004. p. 198-203.
  • 16
    • 26444507627 scopus 로고    scopus 로고
    • Yang Jianhua, Huang Shou-Hsuan Stephen. Matching TCP packets and its application to the detection of long connection chains. In: Proceedings (IEEE) of 19th international conference on advanced information networking and applications (AINA'05), Taipei, Taiwan; March 2005. p. 1005-10.
  • 17
    • 36549019776 scopus 로고    scopus 로고
    • Ylonen T. SSH protocol architecture. Draft IETF document, ; June 2004a.
  • 18
    • 36549012475 scopus 로고    scopus 로고
    • Ylonen T. SSH transport layer protocol. Draft IETF document, ; June 2004b.
  • 19
    • 85084161090 scopus 로고    scopus 로고
    • Zhang Yin, Paxson Vern. Detecting stepping-stones. In: Proceedings of the 9th USENIX security symposium, Denver, CO; August 2000. p. 67-81.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.