메뉴 건너뛰기




Volumn , Issue , 2008, Pages 34-40

Distack - a framework for anomaly-based large-scale attack detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; INTERNET;

EID: 55849097730     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2008.8     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 55849114307 scopus 로고    scopus 로고
    • Arbor Networks. Worldwide Infrastructure Security Report. http://www.arbornetworks.com/report, Sept. 2007.
    • Arbor Networks. Worldwide Infrastructure Security Report. http://www.arbornetworks.com/report, Sept. 2007.
  • 2
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-Service Attack-Detection Techniques
    • Jan
    • G. Carl, G. Kesidis, R. Brooks, and S. Rai. Denial-of-Service Attack-Detection Techniques. IEEE Internet Computing, 10(1):82-89, Jan. 2006.
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.3    Rai, S.4
  • 3
    • 1242321281 scopus 로고    scopus 로고
    • DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art
    • Apr
    • C. Douligeris and A. Mitrokotsa. DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks, 44(5):643-666, Apr. 2004.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 7
    • 33750264130 scopus 로고    scopus 로고
    • An extensible and flexible System for Network Anomaly Detection
    • Sept
    • T. Gamer, M. Schöller, and R. Bless. An extensible and flexible System for Network Anomaly Detection. In Proc. of Autonomic Networking, pages 97-108, Sept. 2006.
    • (2006) Proc. of Autonomic Networking , pp. 97-108
    • Gamer, T.1    Schöller, M.2    Bless, R.3
  • 8
    • 84942121141 scopus 로고    scopus 로고
    • Indra: A peer-to-peer approach to network intrusion detection and prevention
    • June
    • R. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: A peer-to-peer approach to network intrusion detection and prevention. In Proc. of IEEE WETICE, pages 226-231, June 2003.
    • (2003) Proc. of IEEE WETICE , pp. 226-231
    • Janakiraman, R.1    Waldvogel, M.2    Zhang, Q.3
  • 9
    • 33750226062 scopus 로고    scopus 로고
    • Simulation of Internet DDoS Attacks and Defense
    • Oct
    • I. V. Kotenko and A. Ulanov. Simulation of Internet DDoS Attacks and Defense. In Proc. of ISC, pages 327-342, Oct. 2006.
    • (2006) Proc. of ISC , pp. 327-342
    • Kotenko, I.V.1    Ulanov, A.2
  • 14
    • 52249112362 scopus 로고    scopus 로고
    • M. Roesch. Snort, http://www.snort.org, 2001.
    • (2001) Snort
    • Roesch, M.1
  • 17
    • 79955747674 scopus 로고    scopus 로고
    • LADS: Large-scale Automated DDoS detection System
    • June
    • V. Sekar. LADS: Large-scale Automated DDoS detection System. In Proc. of USENIX Technical Conference, pages 171-184, June 2005.
    • (2005) Proc. of USENIX Technical Conference , pp. 171-184
    • Sekar, V.1
  • 21
  • 23
    • 28044469549 scopus 로고    scopus 로고
    • The Monitoring and Early Detection of Internet Worms
    • Oct
    • C. C. Zou. The Monitoring and Early Detection of Internet Worms. IEEE/ACM Transactions on Networking, 13(5):961-974, Oct. 2004.
    • (2004) IEEE/ACM Transactions on Networking , vol.13 , Issue.5 , pp. 961-974
    • Zou, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.