메뉴 건너뛰기




Volumn , Issue , 2007, Pages 57-64

Large-scale collection and sanitization of network security data: Risks and challenges

Author keywords

[No Author keywords available]

Indexed keywords

COLLABORATIVE SECURITY; COORDINATED ATTACKS; LARGE-SCALE COLLECTION; NETWORK SECURITY DATA;

EID: 36949014927     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1278940.1278949     Document Type: Conference Paper
Times cited : (19)

References (54)
  • 2
    • 36949037928 scopus 로고    scopus 로고
    • BACK, A., GOLDBERG, I., AND SHOSTACK, A. Freedom Systems 2.1 security issues and analysis, http://www.freehaven.net/ anonbib/cache/freedom21-security.pdf, May 2001.
    • BACK, A., GOLDBERG, I., AND SHOSTACK, A. Freedom Systems 2.1 security issues and analysis, http://www.freehaven.net/ anonbib/cache/freedom21-security.pdf, May 2001.
  • 3
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Proc. 4th International Workshop on Information Hiding, of
    • BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proc. 4th International Workshop on Information Hiding (2001), vol. 2137 of LNCS, pp. 245-257.
    • (2001) LNCS , vol.2137 , pp. 245-257
    • BACK, A.1    MÖLLER, U.2    STIGLIC, A.3
  • 8
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • CAMENISCH, J., AND LYSYANSKAYA, A. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Proc. Advances in Cryptology - EUROCRYPT (2001), pp. 93-118.
    • (2001) Proc. Advances in Cryptology - EUROCRYPT , pp. 93-118
    • CAMENISCH, J.1    LYSYANSKAYA, A.2
  • 9
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (1981), 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • CHAUM, D.1
  • 12
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Proc. International Workshop on Design Issues in Anonymity and Unobservability, of, Springer-Verlag, pp
    • CLARKE, I., SANDBERG, O., WILEY, B., AND HONG, T. Freenet: A distributed anonymous information storage and retrieval system. In Proc. International Workshop on Design Issues in Anonymity and Unobservability (2001), vol. 2009 of LNCS, Springer-Verlag, pp. 46-66.
    • (2001) LNCS , vol.2009 , pp. 46-66
    • CLARKE, I.1    SANDBERG, O.2    WILEY, B.3    HONG, T.4
  • 17
    • 36949000629 scopus 로고    scopus 로고
    • DSHIELD. http://www.dshield.org, 2006.
    • DSHIELD. http://www.dshield.org, 2006.
  • 27
    • 36949026356 scopus 로고    scopus 로고
    • LIPMAA, H. Group signature schemes. http://www.cs.ut.ee/ lipmaa/crypto/link/signature/group.php, 2006.
    • LIPMAA, H. Group signature schemes. http://www.cs.ut.ee/ "lipmaa/crypto/link/signature/group.php, 2006.
  • 30
    • 17644414542 scopus 로고    scopus 로고
    • Locality: A new paradigm for thinking about normal behavior and outsider threat
    • MCHUGH, J., AND GATES, C. Locality: a new paradigm for thinking about normal behavior and outsider threat. In Proc. New Security Paradigms Workshop (2003), pp. 3-10.
    • (2003) Proc. New Security Paradigms Workshop , pp. 3-10
    • MCHUGH, J.1    GATES, C.2
  • 32
    • 36949027303 scopus 로고    scopus 로고
    • MYNETWATCHMAN. http://www.mynetwatchman.com, 2006.
    • MYNETWATCHMAN. http://www.mynetwatchman.com, 2006.
  • 37
    • 1242310066 scopus 로고    scopus 로고
    • A high-level programming environment for packet trace anonymization and transformation
    • PANG, R., AND PAXSON, V. A high-level programming environment for packet trace anonymization and transformation. In Proc. ACM SIGCOMM (2003), pp. 339-351.
    • (2003) Proc. ACM SIGCOMM , pp. 339-351
    • PANG, R.1    PAXSON, V.2
  • 40
    • 0142250280 scopus 로고    scopus 로고
    • Passive attack analysis for connect ion-based anonymity systems
    • Proc. 8th European Symposium on Research in Computer Security, of
    • SERJANTOV, A., AND SEWELL, P. Passive attack analysis for connect ion-based anonymity systems. In Proc. 8th European Symposium on Research in Computer Security (2003), vol. 2808 of LNCS, pp. 116-131.
    • (2003) LNCS , vol.2808 , pp. 116-131
    • SERJANTOV, A.1    SEWELL, P.2
  • 44
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Proc. Workshop on Design Issues in Anonymity and Unobservabitity, of
    • SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. Towards an analysis of onion routing security. In Proc. Workshop on Design Issues in Anonymity and Unobservabitity (2000), vol. 2009 of LNCS, pp. 96-114.
    • (2000) LNCS , vol.2009 , pp. 96-114
    • SYVERSON, P.1    TSUDIK, G.2    REED, M.3    LANDWEHR, C.4
  • 54
    • 33646179175 scopus 로고    scopus 로고
    • Internet intrusions: Global characteristics and prevalence
    • YEGNESWARAN, V., BARFORD, P., AND ULLRICH, J. Internet intrusions: global characteristics and prevalence. In Proc. ACM SIGMETRICS (2003), pp. 138-147.
    • (2003) Proc. ACM SIGMETRICS , pp. 138-147
    • YEGNESWARAN, V.1    BARFORD, P.2    ULLRICH, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.