메뉴 건너뛰기




Volumn , Issue , 2007, Pages 77-82

Lightweight detection of DoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; INTERNET; MAPS; NETWORK SECURITY; SECURITY OF DATA; SENSORS; TELECOMMUNICATION TRAFFIC; TURBULENT FLOW;

EID: 48149114703     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICON.2007.4444065     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 2
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
    • J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM Sigcomm Computer Comm. Rev., vol. 34, no.2, 2004, 39-53.
    • (2004) ACM Sigcomm Computer Comm. Rev , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 3
    • 48149093799 scopus 로고    scopus 로고
    • Snort, http://www.snort.org.
    • Snort
  • 4
    • 14944383480 scopus 로고    scopus 로고
    • Class-of- service mapping for QoS: A statistical signature-based approach to IP traffic classification
    • M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, "Class-of- service mapping for QoS: A statistical signature-based approach to IP traffic classification," Internet Measurement Conference, 2004
    • (2004) Internet Measurement Conference
    • Roughan, M.1    Sen, S.2    Spatscheck, O.3    Duffield, N.4
  • 7
    • 14344265818 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis
    • A. Moore and D. Zuew, "Internet traffic classification using Bayesian analysis," In Proceeding of ACM SIGMETRICS, 2005.
    • (2005) Proceeding of ACM SIGMETRICS
    • Moore, A.1    Zuew, D.2
  • 8
    • 84901460824 scopus 로고    scopus 로고
    • A Network IDS with Low False Positive Rate
    • Yan Qial and Xie Weixin, "A Network IDS with Low False Positive Rate," In Proceeding of the 2002 Congress on, Vol.2, pp. 1121-1126, 2002.
    • (2002) Proceeding of the 2002 Congress on , vol.2 , pp. 1121-1126
    • Yan, Q.1    Xie, W.2
  • 9
    • 48149111770 scopus 로고    scopus 로고
    • Neptune http://www.phrack.org/archives/48/P48-13.
    • Neptune
  • 10
    • 48149114596 scopus 로고    scopus 로고
    • nmap http://insecure.org/nmap/.
    • nmap http://insecure.org/nmap/.
  • 11
    • 48149099519 scopus 로고    scopus 로고
    • jping http://www.tenebril.com/src/info.php?id=11777455.
    • jping http://www.tenebril.com/src/info.php?id=11777455.
  • 12
    • 48149105580 scopus 로고    scopus 로고
    • nbtscan http://www.inetcat.net/sonware/nbtscan.html.
    • nbtscan http://www.inetcat.net/sonware/nbtscan.html.
  • 13
    • 4143130116 scopus 로고    scopus 로고
    • CERT Coordination Center, "Denial of Service Attacks," http://www.cert.org/tech_tips/denial_of_service.html.
    • Denial of Service Attacks
  • 16
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy,
    • Technical Report 99-15, Department of Computer Engineering, Chalmers University, March
    • S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
    • (2000)
    • Axelsson, S.1
  • 17
    • 48149115784 scopus 로고    scopus 로고
    • Flashget http://www.flashget.com/.
    • Flashget
  • 18
    • 0036343692 scopus 로고    scopus 로고
    • Haining Wang, Danlu Zhang, and Kang G. Shin, Detecting SYN Flooding Attacks, In Proceeding of IEEE INFOCOM'2002, New York City, June 2002.
    • Haining Wang, Danlu Zhang, and Kang G. Shin, "Detecting SYN Flooding Attacks," In Proceeding of IEEE INFOCOM'2002, New York City, June 2002.
  • 19
    • 48149095009 scopus 로고    scopus 로고
    • Security Focus, Identifying P2P users using traffic analysis, http://www.securityfocus.com/infocus/1843.
    • Security Focus, "Identifying P2P users using traffic analysis", http://www.securityfocus.com/infocus/1843.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.