메뉴 건너뛰기




Volumn , Issue , 2007, Pages

A practice of the intrusion prevention system

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK PACKETS; DISTRIBUTED DENIAL-OF-SERVICE ATTACKS; EDGE ROUTER; INTERNET BACKBONE; INTRUSION PREVENTION SYSTEM; NETWORK BANDWIDTHS; SOURCE-END DEFENSE;

EID: 48649097500     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TENCON.2007.4428862     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 2
    • 1242321281 scopus 로고    scopus 로고
    • DDoS attacks and defense mechanisms: Classification and state-of-the-art
    • C. Douligeris and A. Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art", Computer Networks 44 (2004) 643-666.
    • (2004) Computer Networks , vol.44 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 4
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-Service Attacks Rip the Internet
    • Apr
    • L. Garber, "Denial-of-Service Attacks Rip the Internet", Computer, Apr 2000, pp.12-17.
    • (2000) Computer , pp. 12-17
    • Garber, L.1
  • 7
    • 48649100074 scopus 로고    scopus 로고
    • Advanced and Authenticated Marking Schemes for IP Traceback
    • Jun
    • D.X. Song, A. Perring, "Advanced and Authenticated Marking Schemes for IP Traceback", SIGCOMM, Jun 2000.
    • (2000) SIGCOMM
    • Song, D.X.1    Perring, A.2
  • 9
    • 48649092046 scopus 로고    scopus 로고
    • Efficient and Robust IP Traceback
    • is/GRP/Projects /IP_Traceback.htm
    • M. Soshi, "Efficient and Robust IP Traceback", http://www.jaist.ac.jp/is/GRP/Projects /IP_Traceback.htm.
    • Soshi, M.1
  • 12
    • 48649103067 scopus 로고    scopus 로고
    • RCF2267, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, 1998.
    • RCF2267, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", 1998.
  • 17
    • 0029356674 scopus 로고
    • Link-Sharing and resource management models for packet networks
    • August
    • S. Floyd and V. Jacobson, "Link-Sharing and resource management models for packet networks", IEEE/ACM Transactions on Networking, August 1995.
    • (1995) IEEE/ACM Transactions on Networking
    • Floyd, S.1    Jacobson, V.2
  • 19
    • 48649091636 scopus 로고    scopus 로고
    • Linux Kernel, The Linux Kernel Archives, http://www.kernel. org/.
    • Linux Kernel, "The Linux Kernel Archives", http://www.kernel. org/.
  • 20
    • 48649083728 scopus 로고    scopus 로고
    • G. Foundation,Gentoo Linux, http:// www. gentoo.org/main/en/ about.xml.
    • G. Foundation,"Gentoo Linux", http:// www. gentoo.org/main/en/ about.xml.
  • 21
    • 77951593523 scopus 로고    scopus 로고
    • the de facto standard for intrusion detection- prevention
    • Snort, "the de facto standard for intrusion detection- prevention", http://www.snort.org/
  • 22
    • 0031274649 scopus 로고    scopus 로고
    • Wide-Area Internet Traffic Patterns and Characteristics
    • November December
    • N K. Thompson, G. J. Miller, and R. Wilder, "Wide-Area Internet Traffic Patterns and Characteristics". IEEE Network, Vol. II, No. 6, November December 1997.
    • (1997) IEEE Network , vol.2 , Issue.6
    • Thompson, N.K.1    Miller, G.J.2    Wilder, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.