메뉴 건너뛰기




Volumn 4, Issue 1-2, 2009, Pages 110-124

An evaluation of connection characteristics for separating network attacks

Author keywords

Attack characteristics; Data mining; Honeypot; Statistical analysis

Indexed keywords

DATA MINING; EFFICIENCY; NETWORK SECURITY; STATISTICAL METHODS; STATISTICAL TESTS;

EID: 61849085156     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.023430     Document Type: Article
Times cited : (19)

References (36)
  • 2
    • 33845564966 scopus 로고    scopus 로고
    • A Hybrid Honeypot Architecture for Scalable Network Monitoring
    • Department of Electrical Engineering, University of Michigan
    • Bailey, M., Cooke, E., Watson, D., Jahanian, F. and Provos, N. (2004) A Hybrid Honeypot Architecture for Scalable Network Monitoring, Department of Electrical Engineering, University of Michigan, Technical Report CSE-TR, pp.499-504.
    • (2004) Technical Report CSE-TR , pp. 499-504
    • Bailey, M.1    Cooke, E.2    Watson, D.3    Jahanian, F.4    Provos, N.5
  • 9
    • 84858092916 scopus 로고    scopus 로고
    • Honeyd (2006) World Wide Web, http://www.honeyd.org
    • (2006) World Wide Web
  • 10
    • 61849143069 scopus 로고    scopus 로고
    • IDSeval (1998) World Wide Web, http://www.ll.mit.edu/mission/ communications/ist/corpora/ideval/docs/index.html
    • (1998) World Wide Web
    • IDSeval1
  • 11
    • 33845567241 scopus 로고    scopus 로고
    • Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms
    • Department of Computer Science, Purdue University
    • Jiang, X. and Xu, D. (2005) Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms, Department of Computer Science, Purdue University, Technical Report CSD TR, pp.5-27.
    • (2005) Technical Report CSD TR , pp. 5-27
    • Jiang, X.1    Xu, D.2
  • 12
    • 61849180125 scopus 로고    scopus 로고
    • KDDcup (1999) World Wide Web, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html
    • (1999) World Wide Web
    • KDDcup1
  • 13
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signatures using honeypots
    • Kreibich, C. and Crowcroft, J. (2004) 'Honeycomb: Creating intrusion detection signatures using honeypots', ACM SIGCOMM Computer Communication Review, Vol. 34, pp.51-56.
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2
  • 15
    • 33744779904 scopus 로고    scopus 로고
    • A new unsupervised anomaly detection framework for detecting network attacks in real-time
    • Lu, W. and Traore, I. (2005) 'A new unsupervised anomaly detection framework for detecting network attacks in real-time', Lecture Notes in Computer Science, Vol. 3810, p.96.
    • (2005) Lecture Notes in Computer Science , vol.3810 , pp. 96
    • Lu, W.1    Traore, I.2
  • 18
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by Lincoln laboratory
    • McHugh, J. (2000) 'Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by Lincoln laboratory', ACM Transactions on Information and System Security, Vol. 3, No. 4, pp.262-294.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 19
    • 84858092916 scopus 로고    scopus 로고
    • NetworkComputing
    • NetworkComputing (2006) World Wide Web, http://www.network computing.com/alertcon/
    • (2006) World Wide Web
  • 20
    • 84858092916 scopus 로고    scopus 로고
    • Norton, (2006) World Wide Web, http://www.norton.com
    • (2006) World Wide Web
  • 22
    • 33749606368 scopus 로고    scopus 로고
    • Petrovic, S., Alvarez, G., Orfila, A. and Carbo, J. (2006) 'Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques', Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Hawaii, USA, 6, p.129.2.
    • Petrovic, S., Alvarez, G., Orfila, A. and Carbo, J. (2006) 'Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques', Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Hawaii, USA, Vol. 6, p.129.2.
  • 25
    • 84858092916 scopus 로고    scopus 로고
    • SANS
    • SANS (2006) World Wide Web, http://www.sans.org
    • (2006) World Wide Web
  • 26
    • 61849114959 scopus 로고    scopus 로고
    • SANS: () World Wide Web
    • SANS:sUrvival (2006) World Wide Web, http://isc.sans.org/ survivaltime.html
    • (2006) sUrvival
  • 28
    • 0242456133 scopus 로고    scopus 로고
    • An empirical analysis of NATE: Network analysis of anomalous traffic events
    • Virginia Beach, VA, USA, pp
    • Taylor, C. and Alves-Foss, J. (2002) 'An empirical analysis of NATE: network analysis of anomalous traffic events', Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, pp.18-26.
    • (2002) Proceedings of the 2002 Workshop on New Security Paradigms , pp. 18-26
    • Taylor, C.1    Alves-Foss, J.2
  • 29
    • 61849177316 scopus 로고    scopus 로고
    • Master Thesis, Eurecom Institute, University of Nice Sophia-Antipolis and Information Security Institute, Queensland University of Technology
    • Tber, R. (2005) A Practical Comparison of Low and High Interactivity Honeypots, Master Thesis, Eurecom Institute, University of Nice Sophia-Antipolis and Information Security Institute, Queensland University of Technology.
    • (2005) A Practical Comparison of Low and High Interactivity Honeypots
    • Tber, R.1
  • 32
    • 84858092916 scopus 로고    scopus 로고
    • Weka (2006) World Wide Web, http://www.cs.waikato.ac.nz/ml/weka
    • (2006) World Wide Web
    • Weka1
  • 33
    • 70350322899 scopus 로고    scopus 로고
    • Wireshark (2005) World Wide Web, http://www.wireshark.org
    • (2005) World Wide Web
  • 35
    • 5044231297 scopus 로고    scopus 로고
    • Honeypot and scan detection in intrusion detection system
    • Niagara Falls, Ontario, Canada, pp
    • Yin, C., Li, M., Ma, J. and Sun, J. (2004) 'Honeypot and scan detection in intrusion detection system', Canadian Conference on Electrical and Computer Engineering, Vol. 2, Niagara Falls, Ontario, Canada, pp.1107-1110.
    • (2004) Canadian Conference on Electrical and Computer Engineering , vol.2 , pp. 1107-1110
    • Yin, C.1    Li, M.2    Ma, J.3    Sun, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.