메뉴 건너뛰기




Volumn 52, Issue 5, 2008, Pages 1074-1092

A NetFlow based flow analysis and monitoring system in enterprise networks

Author keywords

Intrusion detection; Matching pattern; NetFlow; Similarity; Traffic measurement

Indexed keywords

DATA ACQUISITION; DATABASE SYSTEMS; INTRUSION DETECTION; PATTERN MATCHING; SERVERS; TELECOMMUNICATION TRAFFIC; WEB SERVICES;

EID: 39649109444     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2007.12.004     Document Type: Article
Times cited : (22)

References (43)
  • 1
    • 39549123894 scopus 로고    scopus 로고
    • Cisco, Cisco IOS NetFlow Technology Data Sheet. .
    • Cisco, Cisco IOS NetFlow Technology Data Sheet. .
  • 2
    • 33846304450 scopus 로고    scopus 로고
    • Intrusion detection for viruses and worms
    • Chen T. Intrusion detection for viruses and worms. IEC Annual Review of Communications 57 Fall (2004)
    • (2004) IEC Annual Review of Communications , vol.57 , Issue.Fall
    • Chen, T.1
  • 3
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
    • Wang H., Zhang D., and Shin K.G. Detecting SYN flooding attacks. INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE 3 23-27 (2002) 1530-1539
    • (2002) Proceedings IEEE , vol.3 , Issue.23-27 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 4
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • Siris V.A., and Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks. Global Telecommunications Conference 29 3 (2004) 2050-2054
    • (2004) Global Telecommunications Conference , vol.29 , Issue.3 , pp. 2050-2054
    • Siris, V.A.1    Papagalou, F.2
  • 5
    • 39049163945 scopus 로고    scopus 로고
    • Seung-won Shin, Ki-young Kim, Jong-soo Jang, D-SAT: detecting SYN flooding attack by two-stage statistical approach, applications and the Internet, in: Proceedings, The 2005 Symposium on 31 January-4 February 2005, pp. 430-436.
    • Seung-won Shin, Ki-young Kim, Jong-soo Jang, D-SAT: detecting SYN flooding attack by two-stage statistical approach, applications and the Internet, in: Proceedings, The 2005 Symposium on 31 January-4 February 2005, pp. 430-436.
  • 6
    • 84949751558 scopus 로고    scopus 로고
    • J.B.D. Caberera, T.B. Ravichandran, R.K. Mehra, Statistical traffic modeling for network intrusion detection, in: Proceedings of 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2000, 29(1), 2000, pp. 466-473.
    • J.B.D. Caberera, T.B. Ravichandran, R.K. Mehra, Statistical traffic modeling for network intrusion detection, in: Proceedings of 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2000, 29(1), 2000, pp. 466-473.
  • 7
    • 0035792373 scopus 로고    scopus 로고
    • John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson, Fuzzy intrusion detection, in: IFSA World Congress and 20th NAFIPS International Conference 9(3), 2001, vol. 1506-1510.
    • John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson, Fuzzy intrusion detection, in: IFSA World Congress and 20th NAFIPS International Conference 9(3), 2001, vol. 1506-1510.
  • 8
    • 39649099852 scopus 로고    scopus 로고
    • R.C. Garcia, M.N.O. Sadiku, J.D. Cannady, WAID: wavelet analysis intrusion detection, circuits and systems, 2002, in: M-WSCAS-2002, The 2002 45th Midwest Symposium, vol. 3, 4-7 August 2002, pp. III-688-III-691.
    • R.C. Garcia, M.N.O. Sadiku, J.D. Cannady, WAID: wavelet analysis intrusion detection, circuits and systems, 2002, in: M-WSCAS-2002, The 2002 45th Midwest Symposium, vol. 3, 4-7 August 2002, pp. III-688-III-691.
  • 9
    • 84964555718 scopus 로고    scopus 로고
    • M. Li, W. Jia, W. Zhao, Decision analysis of network based intrusion detection systems for denial-of-service attacks, in: Proceedings, IEEE Conferences on Info-tech and Infonet, 2001.
    • M. Li, W. Jia, W. Zhao, Decision analysis of network based intrusion detection systems for denial-of-service attacks, in: Proceedings, IEEE Conferences on Info-tech and Infonet, 2001.
  • 10
    • 39649096612 scopus 로고    scopus 로고
    • Yiming Gong, Detecting Worms, and Anomaly Activities with NetFlow. .
    • Yiming Gong, Detecting Worms, and Anomaly Activities with NetFlow. .
  • 12
    • 39649086139 scopus 로고    scopus 로고
    • P. Huang, A. Feldmann, A.C. Gilbert, W. Willinger, Dynamics of ip traffic: a study of the role of variability and the impact of control, in: ACM SIGCOMM'99, vol. 29, Massachusetts, USA, 1999.
    • P. Huang, A. Feldmann, A.C. Gilbert, W. Willinger, Dynamics of ip traffic: a study of the role of variability and the impact of control, in: ACM SIGCOMM'99, vol. 29, Massachusetts, USA, 1999.
  • 14
    • 0026156486 scopus 로고    scopus 로고
    • Shiuh-Pyng Shieh, Virgil D. Gligor, A pattern-oriented intrusion detection system and its applications, in: Proceedings of IEEE symposium Research in Security and Privacy, Oakland, CA, May 1991, pp. 327-342.
    • Shiuh-Pyng Shieh, Virgil D. Gligor, A pattern-oriented intrusion detection system and its applications, in: Proceedings of IEEE symposium Research in Security and Privacy, Oakland, CA, May 1991, pp. 327-342.
  • 15
    • 39649118698 scopus 로고    scopus 로고
    • Sandeep Kumar, Eugene H. Spafford, A pattern matching model for misuse intrusion detection, in: Proceedings of the 17th National Computer security conference, Baltimore, MD, 1994.
    • Sandeep Kumar, Eugene H. Spafford, A pattern matching model for misuse intrusion detection, in: Proceedings of the 17th National Computer security conference, Baltimore, MD, 1994.
  • 16
    • 84964497101 scopus 로고    scopus 로고
    • C.J. Coit, S. Staniford, J. McAlemey, Towards faster string matching for intrusion detection or exceeding the speed of snort, in: DARPA Information Survivability Conference and Exposition (DISCEX II 01), Anaheim, CA, June 2001.
    • C.J. Coit, S. Staniford, J. McAlemey, Towards faster string matching for intrusion detection or exceeding the speed of snort, in: DARPA Information Survivability Conference and Exposition (DISCEX II 01), Anaheim, CA, June 2001.
  • 19
    • 0029323403 scopus 로고
    • Wide-area traffic: the failure of Poisson modeling
    • Paxson V., and Floyd S. Wide-area traffic: the failure of Poisson modeling. IEEE/ACM Trans Networking 3 3 (1995)
    • (1995) IEEE/ACM Trans Networking , vol.3 , Issue.3
    • Paxson, V.1    Floyd, S.2
  • 20
    • 0842289254 scopus 로고    scopus 로고
    • T. Peng, C. Leckie, K. Ramamohanarao, Detecting reflector attacks by sharing beliefs, in: Proceedings of the IEEE 2003 Global Communications Conference (Globecom 2003), vol. 3, San Francisco, California, USA, 2003b, pp. 1358-1362.
    • T. Peng, C. Leckie, K. Ramamohanarao, Detecting reflector attacks by sharing beliefs, in: Proceedings of the IEEE 2003 Global Communications Conference (Globecom 2003), vol. 3, San Francisco, California, USA, 2003b, pp. 1358-1362.
  • 21
    • 33745371142 scopus 로고    scopus 로고
    • T. Peng, C. Leckie, K. Ramamohanarao, Proactively detecting DDoS attack using source IP address monitoring, in: Proceedings of Networking 2004, Athens, Greece, 2004, pp. 771-782.
    • T. Peng, C. Leckie, K. Ramamohanarao, Proactively detecting DDoS attack using source IP address monitoring, in: Proceedings of Networking 2004, Athens, Greece, 2004, pp. 771-782.
  • 22
    • 39649089230 scopus 로고    scopus 로고
    • Harold S. Javitz, Alfonso Valdes, The NIDES statistical component: description and justification, SRI International, March 1993.
    • Harold S. Javitz, Alfonso Valdes, The NIDES statistical component: description and justification, SRI International, March 1993.
  • 23
    • 39649109978 scopus 로고    scopus 로고
    • Zheng Zhang, Jun Li, C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West point, NY, 5-6 June, 2001.
    • Zheng Zhang, Jun Li, C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West point, NY, 5-6 June, 2001.
  • 25
    • 84940104123 scopus 로고    scopus 로고
    • Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the 20th IEEE symposium on security and privacy, Oakland, CA 1999.
    • Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the 20th IEEE symposium on security and privacy, Oakland, CA 1999.
  • 26
    • 85084163349 scopus 로고    scopus 로고
    • Wenke Lee, Salvatore J. Stolfo, Data mining approaches for Intrusion detection system, in: Proceedings of the 7th USENIX security symposium, San Antonio, TX, January, 1998.
    • Wenke Lee, Salvatore J. Stolfo, Data mining approaches for Intrusion detection system, in: Proceedings of the 7th USENIX security symposium, San Antonio, TX, January, 1998.
  • 27
    • 39649124074 scopus 로고    scopus 로고
    • Bertrand Portier, Jerome Froment, Data mining techniques for Intrusion detection, Data mining term paper, The University of Texas, Spring, 2000.
    • Bertrand Portier, Jerome Froment, Data mining techniques for Intrusion detection, Data mining term paper, The University of Texas, Spring, 2000.
  • 28
    • 0036085392 scopus 로고    scopus 로고
    • Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung, Intrusion detection using neural networks and support vector machines, Appeared in IEEE IJCNN, May 2002.
    • Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung, Intrusion detection using neural networks and support vector machines, Appeared in IEEE IJCNN, May 2002.
  • 29
    • 0026850007 scopus 로고    scopus 로고
    • Herve Debar, Monique Becker, Didier Siboni, A neural network component for an Intrusion Detection System, in: Proceedings of the 1992 IEEE computer Society Symposium on research in Computer Security and Privacy, 1992, pp. 240-250.
    • Herve Debar, Monique Becker, Didier Siboni, A neural network component for an Intrusion Detection System, in: Proceedings of the 1992 IEEE computer Society Symposium on research in Computer Security and Privacy, 1992, pp. 240-250.
  • 31
    • 39649113622 scopus 로고    scopus 로고
    • Ludovic Me, GASSATA, a genetic algorithm as an alternative tool for security audit trail analysis, in: 1st International Conference on the Recent Advances in Intrusion Detection, Belgium 1998.
    • Ludovic Me, GASSATA, a genetic algorithm as an alternative tool for security audit trail analysis, in: 1st International Conference on the Recent Advances in Intrusion Detection, Belgium 1998.
  • 32
    • 39649113405 scopus 로고    scopus 로고
    • Susan M. Bridges, Rayford B. Vaughn, Fuzzy data mining and genetic algorithms, applied to Intrusion Detection.
    • Susan M. Bridges, Rayford B. Vaughn, Fuzzy data mining and genetic algorithms, applied to Intrusion Detection.
  • 36
    • 0029716418 scopus 로고    scopus 로고
    • Stephanie Forrest, Thomas A. Longstaff, A sense of self for UNIX processes, in: Proceedings of 1996 IEEE Symposium on Computer security and Privacy, Los Alamos, CA, pp. 120-128.
    • Stephanie Forrest, Thomas A. Longstaff, A sense of self for UNIX processes, in: Proceedings of 1996 IEEE Symposium on Computer security and Privacy, Los Alamos, CA, pp. 120-128.
  • 37
    • 38549173266 scopus 로고    scopus 로고
    • Jan van Lunteren, High-performance pattern-matching for intrusion detection, in: Proceedings of IEEE INFOCOM 2006, April 2006, pp. 1-13.
    • Jan van Lunteren, High-performance pattern-matching for intrusion detection, in: Proceedings of IEEE INFOCOM 2006, April 2006, pp. 1-13.
  • 38
    • 50449094515 scopus 로고    scopus 로고
    • Z.K. Baker, V.K. Prasanna, High-throughput linked-pattern matching for intrusion detection systems, in: Proceedings of the First Annual ACM Symposium on Architectures for Networking and Communications Systems, 2005.
    • Z.K. Baker, V.K. Prasanna, High-throughput linked-pattern matching for intrusion detection systems, in: Proceedings of the First Annual ACM Symposium on Architectures for Networking and Communications Systems, 2005.
  • 39
    • 33644909842 scopus 로고    scopus 로고
    • Architectures for bit-split string scanning in intrusion detection
    • Tan L., and Sherwood T. Architectures for bit-split string scanning in intrusion detection. IEEE Micro January-February (2006)
    • (2006) IEEE Micro , Issue.January-February
    • Tan, L.1    Sherwood, T.2
  • 40
    • 34548300090 scopus 로고    scopus 로고
    • N.S. Artan, H. Jonathan Chao, TriBiCa: Trie bitmap content analyzer for high-speed network intrusion detection, in: Proceedings of IEEE INFOCOM 2007, May 2007, pp. 125-133.
    • N.S. Artan, H. Jonathan Chao, TriBiCa: Trie bitmap content analyzer for high-speed network intrusion detection, in: Proceedings of IEEE INFOCOM 2007, May 2007, pp. 125-133.
  • 41
    • 50049089892 scopus 로고    scopus 로고
    • C.-T. Huang, S. Thareja, Y.-J. Shin, Wavelet-based real time detection of network traffic anomalies, in: Proceedings of Workshop on Enterprise Network Security (WENS 2006) (in assoc. with Second SecureComm), August 2006.
    • C.-T. Huang, S. Thareja, Y.-J. Shin, Wavelet-based real time detection of network traffic anomalies, in: Proceedings of Workshop on Enterprise Network Security (WENS 2006) (in assoc. with Second SecureComm), August 2006.
  • 43
    • 33846524304 scopus 로고    scopus 로고
    • T. D̈ubendorfer, B. Plattner, A framework for real-time worm attack detection and backbone monitoring, in: Proceedings of IWCIP 2005, November 2005.
    • T. D̈ubendorfer, B. Plattner, A framework for real-time worm attack detection and backbone monitoring, in: Proceedings of IWCIP 2005, November 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.