-
2
-
-
11144272176
-
A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
-
J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM Sigcomm Computer Comm. Rev., vol. 34, no.2, 2004, 39-53.
-
(2004)
ACM Sigcomm Computer Comm. Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
3
-
-
48149093799
-
-
Snort, http://www.snort.org.
-
Snort
-
-
-
4
-
-
14944383480
-
Class-of- service mapping for QoS: A statistical signature-based approach to IP traffic classification
-
M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, "Class-of- service mapping for QoS: A statistical signature-based approach to IP traffic classification," Internet Measurement Conference, 2004
-
(2004)
Internet Measurement Conference
-
-
Roughan, M.1
Sen, S.2
Spatscheck, O.3
Duffield, N.4
-
5
-
-
33845251186
-
Flow clustering using machine learning techniques
-
A. McGregor, M. Hall, P. Lorier, and J. Brunskill, "Flow clustering using machine learning techniques," In Proceeding of Passive and Active Measurement Workshop, 2004
-
(2004)
Proceeding of Passive and Active Measurement Workshop
-
-
McGregor, A.1
Hall, M.2
Lorier, P.3
Brunskill, J.4
-
7
-
-
14344265818
-
Internet traffic classification using Bayesian analysis
-
A. Moore and D. Zuew, "Internet traffic classification using Bayesian analysis," In Proceeding of ACM SIGMETRICS, 2005.
-
(2005)
Proceeding of ACM SIGMETRICS
-
-
Moore, A.1
Zuew, D.2
-
8
-
-
84901460824
-
A Network IDS with Low False Positive Rate
-
Yan Qial and Xie Weixin, "A Network IDS with Low False Positive Rate," In Proceeding of the 2002 Congress on, Vol.2, pp. 1121-1126, 2002.
-
(2002)
Proceeding of the 2002 Congress on
, vol.2
, pp. 1121-1126
-
-
Yan, Q.1
Xie, W.2
-
9
-
-
48149111770
-
-
Neptune http://www.phrack.org/archives/48/P48-13.
-
Neptune
-
-
-
10
-
-
48149114596
-
-
nmap http://insecure.org/nmap/.
-
nmap http://insecure.org/nmap/.
-
-
-
-
11
-
-
48149099519
-
-
jping http://www.tenebril.com/src/info.php?id=11777455.
-
jping http://www.tenebril.com/src/info.php?id=11777455.
-
-
-
-
12
-
-
48149105580
-
-
nbtscan http://www.inetcat.net/sonware/nbtscan.html.
-
nbtscan http://www.inetcat.net/sonware/nbtscan.html.
-
-
-
-
13
-
-
4143130116
-
-
CERT Coordination Center, "Denial of Service Attacks," http://www.cert.org/tech_tips/denial_of_service.html.
-
Denial of Service Attacks
-
-
-
16
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy,
-
Technical Report 99-15, Department of Computer Engineering, Chalmers University, March
-
S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
-
(2000)
-
-
Axelsson, S.1
-
17
-
-
48149115784
-
-
Flashget http://www.flashget.com/.
-
Flashget
-
-
-
18
-
-
0036343692
-
-
Haining Wang, Danlu Zhang, and Kang G. Shin, Detecting SYN Flooding Attacks, In Proceeding of IEEE INFOCOM'2002, New York City, June 2002.
-
Haining Wang, Danlu Zhang, and Kang G. Shin, "Detecting SYN Flooding Attacks," In Proceeding of IEEE INFOCOM'2002, New York City, June 2002.
-
-
-
-
19
-
-
48149095009
-
-
Security Focus, Identifying P2P users using traffic analysis, http://www.securityfocus.com/infocus/1843.
-
Security Focus, "Identifying P2P users using traffic analysis", http://www.securityfocus.com/infocus/1843.
-
-
-
|