메뉴 건너뛰기




Volumn 4, Issue 9, 2007, Pages 1360-1364

Anomaly detection in symmetric network traffic

Author keywords

Adaptive detection; Algorithm design; Anomaly detection; Network security; SYN flooding

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; ESTIMATION; NETWORK SECURITY; PROBABILITY; TELECOMMUNICATION NETWORKS;

EID: 38349188677     PISSN: 17900832     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (12)
  • 2
    • 33744827418 scopus 로고    scopus 로고
    • Sequential Change-point Detection When Unknown Parameters Are Present in the Pre-change Distribution
    • Y. J. Mei, Sequential Change-point Detection When Unknown Parameters Are Present in the Pre-change Distribution, Ann. Statist, Vol.34, No.1, 2006, pp.92-122.
    • (2006) Ann. Statist , vol.34 , Issue.1 , pp. 92-122
    • Mei, Y.J.1
  • 3
    • 18944388780 scopus 로고    scopus 로고
    • Statistical Process Control for Shifts in Mean or Variance Using a Change-Point Formulation
    • D. M. Hawkins, K. D. Zamba, Statistical Process Control for Shifts in Mean or Variance Using a Change-Point Formulation. Technometrics, Vol.47, No.2, 2005, pp.164-173.
    • (2005) Technometrics , vol.47 , Issue.2 , pp. 164-173
    • Hawkins, D.M.1    Zamba, K.D.2
  • 4
    • 0037333205 scopus 로고    scopus 로고
    • Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data
    • N. Ye, S. Vilbert, Q. Chen, Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data, IEEE Transactions on Reliability, Vol.52, No.1, 2003, pp.75-82.
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.1 , pp. 75-82
    • Ye, N.1    Vilbert, S.2    Chen, Q.3
  • 7
    • 33749466484 scopus 로고    scopus 로고
    • A Light-Weight Detection Method Against DDoS Attack
    • in Chinese
    • W. Chen, Y. X. He, W. L. Peng, A Light-Weight Detection Method Against DDoS Attack. Chinese Journal of Computers, Vol.29, No.8, 2006, pp.1392-1400. (in Chinese).
    • (2006) Chinese Journal of Computers , vol.29 , Issue.8 , pp. 1392-1400
    • Chen, W.1    He, Y.X.2    Peng, W.L.3
  • 8
    • 18144385431 scopus 로고    scopus 로고
    • Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks
    • A. S. Vasilios, P. Fotini, Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, Proceedings of GLOBECOM, Vol.4, 2004, pp.2050-2054.
    • (2004) Proceedings of GLOBECOM , vol.4 , pp. 2050-2054
    • Vasilios, A.S.1    Fotini, P.2
  • 9
    • 24644432749 scopus 로고    scopus 로고
    • Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring
    • P. Tao, C. Leckie, K. Ramamohanarao, Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring, Proceedings of NETWORKING, Vol.1, 2004, pp 771-782.
    • (2004) Proceedings of NETWORKING , vol.1 , pp. 771-782
    • Tao, P.1    Leckie, C.2    Ramamohanarao, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.