메뉴 건너뛰기




Volumn 2008, Issue 11, 2008, Pages 12-16

Network reconnaissance

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCE; CRITICAL CURRENT DENSITY (SUPERCONDUCTIVITY); ELECTRONIC COMMERCE; INTERNET;

EID: 55549139103     PISSN: 13534858     EISSN: None     Source Type: Trade Journal    
DOI: 10.1016/S1353-4858(08)70129-6     Document Type: Article
Times cited : (26)

References (11)
  • 1
    • 55549106960 scopus 로고    scopus 로고
    • Hybrid, "Distributed information gathering", Phrack Magazine, 1999, Vol. 9, Issue 55, Article 9, 11 October 2008
    • Hybrid, "Distributed information gathering", Phrack Magazine, 1999, Vol. 9, Issue 55, Article 9, 11 October 2008
  • 2
    • 0004568554 scopus 로고    scopus 로고
    • M.D. Vivo, E. Carrasco, G. Isern and G.O. Vivo, "A review of port scanning techniques", ACM SIGCOMM Computer Communication Review, 29.2 (April 1999): 41-48. New York: ACM.
    • M.D. Vivo, E. Carrasco, G. Isern and G.O. Vivo, "A review of port scanning techniques", ACM SIGCOMM Computer Communication Review, 29.2 (April 1999): 41-48. New York: ACM.
  • 3
    • 34547399387 scopus 로고    scopus 로고
    • M.A. Rajab, J. Zarfoss, F. Monrose and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon". Proceedings of 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06), 25-27 October 2006, Rio de Janeiro, Brazil, New York: ACM, 41-52.
    • M.A. Rajab, J. Zarfoss, F. Monrose and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon". Proceedings of 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06), 25-27 October 2006, Rio de Janeiro, Brazil, New York: ACM, 41-52.
  • 4
    • 55549146968 scopus 로고    scopus 로고
    • CERT IN-98-05, "Probes with spoofed IP addresses". CERT Incident Note, 24 November 1998
    • CERT IN-98-05, "Probes with spoofed IP addresses". CERT Incident Note, 24 November 1998
  • 5
    • 42149134786 scopus 로고    scopus 로고
    • M. Allman, V. Paxson and J. Terrell, "A brief history of scanning". Proceedings of 7th ACM SIGCOMM Conference on Internet Measurement (IMC'07), 24-26 October 2007, San Diego, California, USA, New York: ACM, 77-82.
    • M. Allman, V. Paxson and J. Terrell, "A brief history of scanning". Proceedings of 7th ACM SIGCOMM Conference on Internet Measurement (IMC'07), 24-26 October 2007, San Diego, California, USA, New York: ACM, 77-82.
  • 6
    • 14944369649 scopus 로고    scopus 로고
    • R. Pang, V. Yegneswaran, P. Barford, V. Paxson and L. Peterson, "Characteristics of internet background radiation". Proceedings of 4th ACM SIGCOMM Conference on Internet Measurement (IMC'04), 25-27 October 2004, Taomina, Sicily, Italy, New York: ACM, 27-40.
    • R. Pang, V. Yegneswaran, P. Barford, V. Paxson and L. Peterson, "Characteristics of internet background radiation". Proceedings of 4th ACM SIGCOMM Conference on Internet Measurement (IMC'04), 25-27 October 2004, Taomina, Sicily, Italy, New York: ACM, 27-40.
  • 7
    • 0036090327 scopus 로고    scopus 로고
    • S. Staniford, J.A. Hoagland and J.M. McAlerney, "Practical automated detection of stealthy portscans", Journal of Computer Security 10(1-2) 105-136.
    • S. Staniford, J.A. Hoagland and J.M. McAlerney, "Practical automated detection of stealthy portscans", Journal of Computer Security 10(1-2) 105-136.
  • 8
    • 55549107645 scopus 로고    scopus 로고
    • C. Gates, "Co-ordinated port scans: a model, a detector and an evaluation methodology". PhD thesis. Dalhousie University, Canada, February 2006.
    • C. Gates, "Co-ordinated port scans: a model, a detector and an evaluation methodology". PhD thesis. Dalhousie University, Canada, February 2006.
  • 9
    • 27544493249 scopus 로고    scopus 로고
    • S. Panjwani, S. Tan and K.M. Jarrin, "An experimental evaluation to determine if port scans are precursors to an attack". Proceedings of 2005 International Conference on Dependable Systems and Networks (DSN'05), 28 June-1 July 2005, Yokohama, Japan. Washington: IEEE Computer Society, 602-11.
    • S. Panjwani, S. Tan and K.M. Jarrin, "An experimental evaluation to determine if port scans are precursors to an attack". Proceedings of 2005 International Conference on Dependable Systems and Networks (DSN'05), 28 June-1 July 2005, Yokohama, Japan. Washington: IEEE Computer Society, 602-11.
  • 10
    • 55549114850 scopus 로고    scopus 로고
    • C. McNab, "Network security assessment: know your network". 1st edn., March 2004, Chapter 4. O'Reilly Media.
    • C. McNab, "Network security assessment: know your network". 1st edn., March 2004, Chapter 4. O'Reilly Media.
  • 11
    • 37849009761 scopus 로고    scopus 로고
    • M.G. Kang, J. Caballero and D. Song, "Distributed evasive scan techniques and countermeasures". Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2007, Lucerne, Switzerland, 12-13 July 2007. Proceedings, volume 4579 of LNCS, Berlin: Springer-Verlag, 157-174.
    • M.G. Kang, J. Caballero and D. Song, "Distributed evasive scan techniques and countermeasures". Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2007, Lucerne, Switzerland, 12-13 July 2007. Proceedings, volume 4579 of LNCS, Berlin: Springer-Verlag, 157-174.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.