메뉴 건너뛰기




Volumn , Issue , 2004, Pages 599-612

A flow-based method for abnormal network traffic detection

Author keywords

Abnormal Network Traffic Detection; Network Security Attack; Traffic Monitoring and Analysis

Indexed keywords

ABNORMAL NETWORK TRAFFIC DETECTION; NETWORK SECURITY ANALYSIS; NETWORK TRAFFIC DETECTION; TRAFFIC MONITORING AND ANALYSIS;

EID: 4544268957     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (148)

References (25)
  • 1
    • 4544346801 scopus 로고    scopus 로고
    • February
    • CNN, Immense network assault takes down yahoo, February 2000, http://www.cnn.com/2000/TECH/computing/02/08/yahoo.assault.idg/index.ht ml.
    • (2000) Immense Network Assault Takes Down Yahoo
  • 2
    • 34250211085 scopus 로고    scopus 로고
    • February
    • CNN, Cyber-attacks batter web heavyweights, February 2000, http://www.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/.
    • (2000) Cyber-attacks Batter Web Heavyweights
  • 6
    • 4544388084 scopus 로고    scopus 로고
    • Effect of malicious traffic on the network
    • San Diego, California, April
    • Kun-chan Lan, Alefiya Hussain, and Debojyoti Dutta, "Effect of Malicious Traffic on the Network," Proc. of PAM 2003, San Diego, California, April 2003.
    • (2003) Proc. of PAM 2003
    • Lan, K.-C.1    Hussain, A.2    Dutta, D.3
  • 7
    • 84959060669 scopus 로고    scopus 로고
    • The architecture of NG-MON: A passive network monitoring system
    • 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2002), Montreal, Canada, October
    • Se-Hee Han, Myung-Sup Kim, Hong-Taek Ju, and James W. Hong, "The Architecture of NG-MON: A Passive Network Monitoring System," Lecture Notes in Computer Science 2506, 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2002), Montreal, Canada, October 2002, pp. 16-27.
    • (2002) Lecture Notes in Computer Science , vol.2506 , pp. 16-27
    • Han, S.-H.1    Kim, M.-S.2    Ju, H.-T.3    Hong, J.W.4
  • 8
    • 3042680176 scopus 로고    scopus 로고
    • Diploma Thesis, Istitute of Communication Network and Computer Engineering, University of Stuttgart, Germany
    • Siegfried Lifler, "Using Flows for Analysis and Measurement of Internet Traffic," Diploma Thesis, Istitute of Communication Network and Computer Engineering, University of Stuttgart, Germany, 1997.
    • (1997) Using Flows for Analysis and Measurement of Internet Traffic
    • Lifler, S.1
  • 9
    • 24944468007 scopus 로고    scopus 로고
    • NetFlow services and applications
    • Cisco, White Papers, "NetFlow Services and Applications," http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.htm.
    • White Papers
  • 12
    • 0013347631 scopus 로고    scopus 로고
    • Ping-of-Death (CVE-1999-0128)
    • Common Vulnerabilities and Exposures (CVE), "Ping-of-Death (CVE-1999-0128),"http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-1999-0128.
    • Common Vulnerabilities and Exposures (CVE)
  • 14
    • 0013347631 scopus 로고    scopus 로고
    • SYN flood (CVE-1999-0116)
    • Common Vulnerabilities and Exposures (CVE), "SYN flood (CVE-1999-0116)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0116.
    • Common Vulnerabilities and Exposures (CVE)
  • 15
  • 16
    • 0013347631 scopus 로고    scopus 로고
    • UDP packet storm (CVE-1999-0103)
    • Common Vulnerabilities and Exposures (CVE), "UDP packet storm (CVE-1999-0103)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0103.
    • Common Vulnerabilities and Exposures (CVE)
  • 17
    • 0013347631 scopus 로고    scopus 로고
    • Fraggle (CVE-1999-0514)
    • Common Vulnerabilities and Exposures (CVE), "Fraggle (CVE-1999-0514)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0514.
    • Common Vulnerabilities and Exposures (CVE)
  • 18
    • 0013347631 scopus 로고    scopus 로고
    • HTTP request flood (CVE-1999-0867)
    • Common Vulnerabilities and Exposures (CVE), "HTTP request flood (CVE-1999-0867)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0867.
    • Common Vulnerabilities and Exposures (CVE)
  • 20
    • 1642535783 scopus 로고    scopus 로고
    • A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods
    • New York, June
    • Rudolf B. Blazek, Hongjoong Kim, Boris Rozovskii, and Alexander Tartakovsky, "A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods," Pro. of IEEE Systems, Man and Cybernetics Information Assurance Workshop, New York, June 2001.
    • (2001) Pro. of IEEE Systems, Man and Cybernetics Information Assurance Workshop
    • Blazek, R.B.1    Kim, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 21
    • 0038404196 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Miami Beach, Florida, May
    • David K. Y. Yau, John C. S. Lui, and Feng Lian, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles," Proc. of IEEE International Workshop on Quality of Service (IWQoS), Miami Beach, Florida, May 2002.
    • (2002) Proc. of IEEE International Workshop on Quality of Service (IWQoS)
    • Yau, D.K.Y.1    Lui, J.C.S.2    Lian, F.3
  • 23
    • 84862428961 scopus 로고    scopus 로고
    • eDonkey, http://www.edonkey2000.com/.
  • 25
    • 84862427479 scopus 로고    scopus 로고
    • Welchia Internet Worm, http://securityresponse.symantec.com/avcenter/ venc/data/w32.welchia.worm.html.
    • Welchia Internet Worm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.