메뉴 건너뛰기




Volumn , Issue , 2001, Pages 609-622

Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study

Author keywords

Computer crime; Computer network management; Data security; Information security; Intrusion detection; Monitoring; Samarium; Technology management; Testing; USA Councils

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; INFORMATION MANAGEMENT; INTRUSION DETECTION; MONITORING; NETWORK MANAGEMENT; NETWORK SECURITY; SAMARIUM; SECURITY OF DATA; STATISTICAL TESTS; TESTING; TRANSMISSION CONTROL PROTOCOL;

EID: 51149105210     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INM.2001.918069     Document Type: Conference Paper
Times cited : (117)

References (16)
  • 4
    • 1942531188 scopus 로고    scopus 로고
    • ISCP: Design and Implementation of an Inter-Domain Security Management Agent (SMA) Coordination Protocol
    • IEEE Publishing
    • Z. Fu, H. Huang, T. Wu, S. Wu, F. Gong, C. Xu, and I. Baldine. ISCP: Design and Implementation of an Inter-Domain Security Management Agent (SMA) Coordination Protocol. Proceedings of NOMS, 2000. IEEE Publishing.
    • (2000) Proceedings of NOMS
    • Fu, Z.1    Huang, H.2    Wu, T.3    Wu, S.4    Gong, F.5    Xu, C.6    Baldine, I.7
  • 5
    • 0000351727 scopus 로고
    • Investigating causal relations by econometric models and cross-spectral methods
    • C. W. J. Granger. Investigating causal relations by econometric models and cross-spectral methods. Econometrica, 34:424-438, 1969.
    • (1969) Econometrica , vol.34 , pp. 424-438
    • Granger, C.W.J.1
  • 12
    • 1942531189 scopus 로고    scopus 로고
    • Internet Security - Anatomy of an Attack
    • February 19
    • Science and Technology Section. Internet Security - Anatomy of an Attack. The Economist, February 19, 2000, pages 80-81.
    • (2000) The Economist , pp. 80-81
    • Science and Technology Section1
  • 13
    • 0000859754 scopus 로고
    • TCP/IP Illustrated
    • Addison-Wesley
    • W. R. Stevens. TCP/IP Illustrated, Vol. 1: The Protocols. Addison-Wesley, 1994.
    • (1994) The Protocols , vol.1
    • Stevens, W.R.1
  • 15
    • 0032154135 scopus 로고    scopus 로고
    • Proactive anomaly detection using distributed agents
    • September
    • M. Thottan and C. Ji. Proactive anomaly detection using distributed agents. IEEE Network, pages 21-27, September 1998.
    • (1998) IEEE Network , pp. 21-27
    • Thottan, M.1    Ji, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.