메뉴 건너뛰기




Volumn 3912 LNCS, Issue , 2007, Pages 54-65

Distributed instrusion prevention in active and extensible networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER SOFTWARE; DISTRIBUTED COMPUTER SYSTEMS; PROBLEM SOLVING;

EID: 38049134012     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71500-9_4     Document Type: Conference Paper
Times cited : (2)

References (31)
  • 2
    • 38049143003 scopus 로고    scopus 로고
    • Home
    • Hogwash Homepage http://hogwash.sourceforge.net/docs/overview.html (1999)
    • (1999) Hogwash
  • 6
    • 38049116743 scopus 로고    scopus 로고
    • Bellovin, S.M.: Distributed firewalls.; login: magazine, special issue on security (1999) 37-39
    • Bellovin, S.M.: Distributed firewalls.; login: magazine, special issue on security (1999) 37-39
  • 9
    • 14844320851 scopus 로고    scopus 로고
    • Design of a system for real-time worm detection
    • Stanford, CA
    • Madhusudan, B., Lockwood, J.: Design of a system for real-time worm detection. In: Hot Interconnects, Stanford, CA (2004) 77-83
    • (2004) Hot Interconnects , pp. 77-83
    • Madhusudan, B.1    Lockwood, J.2
  • 12
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
    • Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. Lecture Notes in Computer Science 2218 (2001) 329-350
    • (2001) Lecture Notes in Computer Science , vol.2218 , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 13
    • 0041513339 scopus 로고    scopus 로고
    • Castro, M., Jones, M.B., Kermarrec, A., Rowstron, A., Theimer, Wang, H., Wolman, A.: An evaluation of scalable application-level multicast built using peer-to-peer overlays. In: INFOCOM, San Francisco, CA (2003)
    • Castro, M., Jones, M.B., Kermarrec, A., Rowstron, A., Theimer, Wang, H., Wolman, A.: An evaluation of scalable application-level multicast built using peer-to-peer overlays. In: INFOCOM, San Francisco, CA (2003)
  • 14
    • 84942121141 scopus 로고    scopus 로고
    • Indra: A peer-to-peer approach to network intrusion detection and prevention
    • Janakiraman, R., Waldvogel, M., Zhang, Q.: Indra: A peer-to-peer approach to network intrusion detection and prevention. In: Proceedings of IEEE WETICE 2003. (2003)
    • (2003) Proceedings of IEEE WETICE
    • Janakiraman, R.1    Waldvogel, M.2    Zhang, Q.3
  • 15
    • 38049106575 scopus 로고
    • home
    • Dshield homepage, http://www.dshield.org (1995)
    • (1995) Dshield
  • 17
    • 18644375564 scopus 로고    scopus 로고
    • Song, H., Lu, J., Lockwood, J., Moscola, J.: Secure remote control of fieldprogrammable network devices. In: FCCM, Napa, CA (2004)
    • Song, H., Lu, J., Lockwood, J., Moscola, J.: Secure remote control of fieldprogrammable network devices. In: FCCM, Napa, CA (2004)
  • 20
    • 0004218915 scopus 로고    scopus 로고
    • A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
    • Technical report, University of Maryland, Baltimore County
    • Cedilnik, A., Kagal, L., Perich, F., Undercoffer, J.L., Joshi, A.: A Secure Infrastructure for Service Discovery and Access in Pervasive Computing. Technical report, University of Maryland, Baltimore County (2001)
    • (2001)
    • Cedilnik, A.1    Kagal, L.2    Perich, F.3    Undercoffer, J.L.4    Joshi, A.5
  • 21
    • 33645602931 scopus 로고    scopus 로고
    • SHOMAR: An Open Architecture for Distributed Intrusion Detection Services
    • Technical report, University of Maryland, Baltimore County
    • Undercoffer, J.L., Perich, F., Nicholas, C.: SHOMAR: An Open Architecture for Distributed Intrusion Detection Services. Technical report, University of Maryland, Baltimore County (2002)
    • (2002)
    • Undercoffer, J.L.1    Perich, F.2    Nicholas, C.3
  • 23
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Bertino, E, ed, Proceedings of 1996 European Symposium on Research in Computer Security ESORICS' 96, of, Springer-Verlag
    • Maurer, U.: Modelling a public-key infrastructure. In Bertino, E., ed.: Proceedings of 1996 European Symposium on Research in Computer Security (ESORICS' 96). Volume 1146 of Lecture Notes in Computer Science., Springer-Verlag (1996) 325-350
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 325-350
    • Maurer, U.1
  • 26
    • 18644368071 scopus 로고    scopus 로고
    • Attig, M., Dharmapurikar, S., Lockwood, J.: Implementation results of bloom filters for string matchings. In: FCCM, Napa, CA (2004)
    • Attig, M., Dharmapurikar, S., Lockwood, J.: Implementation results of bloom filters for string matchings. In: FCCM, Napa, CA (2004)
  • 27
    • 33746933411 scopus 로고    scopus 로고
    • A modular system for fpga-based tcp flow processing in high-speed networks
    • FPL, Antwerp, Belgium
    • Schuehler, D.V., Lockwood, J.: A modular system for fpga-based tcp flow processing in high-speed networks. In: Field Programmable Logic and Applications (FPL), Antwerp, Belgium (2004) 301-310
    • (2004) Field Programmable Logic and Applications , pp. 301-310
    • Schuehler, D.V.1    Lockwood, J.2
  • 29
    • 38049139941 scopus 로고    scopus 로고
    • Freepastry webpage. http://www.cs.rice.edu/cs/Systems/Pastry/FreePastry (2004)
    • (2004) Freepastry webpage
  • 31
    • 84968322828 scopus 로고    scopus 로고
    • Decentralized Methods of Certification Authority Using the Digital Signature Schemes
    • Koga, S., Sakurai, K.: Decentralized Methods of Certification Authority Using the Digital Signature Schemes. In: 2nd Anual PKI Research Workshop Proceedings. (2003)
    • (2003) 2nd Anual PKI Research Workshop Proceedings
    • Koga, S.1    Sakurai, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.