메뉴 건너뛰기




Volumn , Issue , 2008, Pages 321-325

Detection SYN flooding attacks using fuzzy logic

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTER CRIME; COMPUTERS; FUZZY LOGIC; FUZZY SETS; FUZZY SYSTEMS; INFORMATION SERVICES; INTERNET; NETWORK SECURITY; PERSONAL COMPUTERS; SECURITY OF DATA;

EID: 51349112877     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISA.2008.50     Document Type: Conference Paper
Times cited : (18)

References (10)
  • 1
    • 0032645074 scopus 로고    scopus 로고
    • TCP IP Security Threats and Attack Methods, Elseiver
    • B.Harris, R. Hunt, "TCP IP Security Threats and Attack Methods", Elseiver, Computer Communications (22), pp: 885-897, 1999.
    • (1999) Computer Communications , vol.22 , pp. 885-897
    • Harris, B.1    Hunt, R.2
  • 3
    • 33646423315 scopus 로고    scopus 로고
    • Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attack, Elseiver
    • V. A. Siris, Fotini P. "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attack", Elseiver, Computer Communications(29), pp: 1433-1442, 2006.
    • (2006) Computer Communications , vol.29 , pp. 1433-1442
    • Siris, V.A.1    Fotini, P.2
  • 7
    • 33744939733 scopus 로고    scopus 로고
    • Intrusion Detection with CUSUM for TCP based DDoS
    • Leu F.Y., Yang W.J., "Intrusion Detection with CUSUM for TCP based DDoS", LNCS 3823, pp:1255-1264, 2005.
    • (2005) LNCS , vol.3823 , pp. 1255-1264
    • Leu, F.Y.1    Yang, W.J.2
  • 8
    • 51349121274 scopus 로고    scopus 로고
    • http://www.faqs.org/rfcs/rfc793.html.
  • 10
    • 51349105090 scopus 로고    scopus 로고
    • http://www.ethereal.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.