메뉴 건너뛰기




Volumn , Issue , 2007, Pages 121-126

Tracing back attacks against encrypted protocols

Author keywords

Encryption; Intrusion detection system (IDS); Traceback

Indexed keywords

COMPUTER SIMULATION; CRYPTOGRAPHY; FEATURE EXTRACTION; INTRUSION DETECTION; TELECOMMUNICATION TRAFFIC; TOPOLOGY;

EID: 36849007415     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1280940.1280966     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 1
    • 33745802064 scopus 로고    scopus 로고
    • Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
    • Sophia Antipolis, French Riviera, France, Sep
    • A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Proc. Recent Advance in Intrusion Detection (RAID), Sophia Antipolis, French Riviera, France, Sep. 2004.
    • (2004) Proc. Recent Advance in Intrusion Detection (RAID)
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 3
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and Authenticated Marking Schemes for IP Traceback
    • Anchorage, Alaska, USA, Apr
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," in Proc. IEEE INFOCOM, Anchorage, Alaska, USA, Apr. 2001.
    • (2001) Proc. IEEE INFOCOM
    • Song, D.1    Perrig, A.2
  • 4
    • 0035010963 scopus 로고    scopus 로고
    • On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack
    • Anchorage, Alaska, USA, Apr
    • W. Lee and K. Park, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," in Proc. IEEE INFOCOM, Anchorage, Alaska, USA, Apr. 2001.
    • (2001) Proc. IEEE INFOCOM
    • Lee, W.1    Park, K.2
  • 6
    • 20344392671 scopus 로고    scopus 로고
    • Tracing Cyber Attacks from the Practical Perspective
    • May
    • Z. Gao and N. Ansari, "Tracing Cyber Attacks from the Practical Perspective," IEEE Commun. Mag., Vol. 43, No. 5, May 2005, pp. 123-131.
    • (2005) IEEE Commun. Mag , vol.43 , Issue.5 , pp. 123-131
    • Gao, Z.1    Ansari, N.2
  • 10
    • 0034300783 scopus 로고    scopus 로고
    • Towards trapping wily intruders in the large
    • Oct
    • G. Mansfield, K. Ohta, Y. Takei, N. Kato, and Y. Nemoto, "Towards trapping wily intruders in the large," Computer Networks, Vol. 34, No. 4, Oct. 2000, pp. 659-670.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 659-670
    • Mansfield, G.1    Ohta, K.2    Takei, Y.3    Kato, N.4    Nemoto, Y.5
  • 11
    • 23844533214 scopus 로고    scopus 로고
    • ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
    • Jan
    • S. P. Joglekar and S. R. Tate, "ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention," J. Universal Computer Science (JUCS), Vol. 11, No. 1, Jan. 2005, pp. 83-103.
    • (2005) J. Universal Computer Science (JUCS) , vol.11 , Issue.1 , pp. 83-103
    • Joglekar, S.P.1    Tate, S.R.2
  • 13
    • 33745913964 scopus 로고    scopus 로고
    • SSL/TLS session-aware user authentication - OR how to effectively thwart the man-in-the-middle
    • Aug
    • R. Oppliger, R. Hauser, and D. Basin, "SSL/TLS session-aware user authentication - OR how to effectively thwart the man-in-the-middle," Computer Communications, Vol. 29, No. 12, Aug. 2006, pp. 2238-2246.
    • (2006) Computer Communications , vol.29 , Issue.12 , pp. 2238-2246
    • Oppliger, R.1    Hauser, R.2    Basin, D.3
  • 14
    • 36849063095 scopus 로고    scopus 로고
    • Available at CERT, OpenSSL servers contain a buffer overflow during the SSL2 handshake process, CERT Vulnerability Note #102795, Jul. 2002.
    • Available at CERT, "OpenSSL servers contain a buffer overflow during the SSL2 handshake process," CERT Vulnerability Note #102795, Jul. 2002.
  • 15
    • 36849066938 scopus 로고    scopus 로고
    • Available at CERT, OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process, CERT Vulnerability Note #561275, Jul. 2002.
    • Available at CERT, "OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process," CERT Vulnerability Note #561275, Jul. 2002.
  • 16
    • 11144320306 scopus 로고    scopus 로고
    • Tracing DDoS Attacks by Comparing Traffic patterns Based on Quadratic Programming Methods
    • K. Sakaguchi, K. Ohta, Y. Waizumi, N. Kato, and Y. Nemoto, "Tracing DDoS Attacks by Comparing Traffic patterns Based on Quadratic Programming Methods," The Transactions of IEICE B (Japanese Edition), Vol. J85-B, No. 8, 2002, pp. 1295-1303.
    • (2002) The Transactions of IEICE B (Japanese Edition) , vol.J85-B , Issue.8 , pp. 1295-1303
    • Sakaguchi, K.1    Ohta, K.2    Waizumi, Y.3    Kato, N.4    Nemoto, Y.5
  • 17
    • 36849061608 scopus 로고    scopus 로고
    • Network Simulator-ns(version 2). http://isl.edu/nsna.rn/ns
    • Network Simulator-ns(version 2). http://isl.edu/nsna.rn/ns
  • 18
    • 36849008121 scopus 로고    scopus 로고
    • Brite, http://www.cs.bu.edu/brite/
    • Brite


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.