메뉴 건너뛰기




Volumn , Issue , 2007, Pages 129-136

Security against probe-response attacks in collaborative intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COLLABORATIVE DETECTION; COLLABORATIVE INTRUSION DETECTION SYSTEM; COLLABORATIVE NETWORK; DEFENSIVE CAPABILITIES; SYSTEM SUPPORTS;

EID: 67349147317     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352664.1352673     Document Type: Conference Paper
Times cited : (23)

References (23)
  • 1
    • 72849124827 scopus 로고    scopus 로고
    • Fighting coordinated attackers with cross-organizational information sharing
    • M. Allman, E. Blanton, V. Paxson, and S. Shenker. Fighting coordinated attackers with cross-organizational information sharing. In Proc. HotNets, 2006.
    • (2006) Proc. HotNets
    • Allman, M.1    Blanton, E.2    Paxson, V.3    Shenker, S.4
  • 4
    • 77954328143 scopus 로고    scopus 로고
    • CAIDA. http://www.caida.org, 2007.
    • (2007)
  • 6
    • 0242529344 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Proc. RAID, 2001.
    • (2001) Proc. RAID
    • Debar, H.1    Wespi., A.2
  • 8
    • 77954320765 scopus 로고    scopus 로고
    • DShield. http://www.dshield.org, 2006.
    • (2006)
  • 10
    • 32144442476 scopus 로고    scopus 로고
    • Technical Report TR-CS-2004-2031, Dept. of Computer Science, University of New Mexico
    • V. King, S. Lewis, and J. Saia. On algorithms for choosing a random peer. Technical Report TR-CS-2004-2031, Dept. of Computer Science, University of New Mexico, 2005.
    • (2005) On Algorithms for Choosing A Random Peer
    • King, V.1    Lewis, S.2    Saia, J.3
  • 11
    • 2442509056 scopus 로고    scopus 로고
    • Decentralized event correlation for intrusion detection
    • C. Krügel, T. Toth, and C. Kerer. Decentralized event correlation for intrusion detection. In Proc. ICISC, 2001.
    • (2001) Proc. ICISC
    • Krügel, C.1    Toth, T.2    Kerer, C.3
  • 12
    • 34248379722 scopus 로고    scopus 로고
    • Towards scalable and robust distributed intrusion alert fusion with good load balancing
    • Z. Li, Y. Chen, and A. Beach. Towards scalable and robust distributed intrusion alert fusion with good load balancing. In Proc. LSAD, 2006.
    • (2006) Proc. LSAD
    • Li, Z.1    Chen, Y.2    Beach, A.3
  • 14
  • 15
    • 31844455702 scopus 로고    scopus 로고
    • Host-based detection of worms through peer-to-peer cooperation
    • D. Malan and M. Smith. Host-based detection of worms through peer-to-peer cooperation. In Proc. WORM, 2005.
    • (2005) Proc. WORM
    • Malan, D.1    Smith, M.2
  • 16
    • 0002245383 scopus 로고    scopus 로고
    • Chord: A scalable peer-to-peer lookup service for Internet applications
    • R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. SIGCOMM, 2001.
    • (2001) Proc. SIGCOMM
    • Morris, R.1    Karger, D.2    Kaashoek, F.3    Balakrishnan, H.4
  • 17
    • 77954325602 scopus 로고    scopus 로고
    • myNetWatchman. http://www.mynetwatchman.com, 2006.
    • (2006)
  • 18
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • A. Nambiar and M. Wright. Salsa: a structured approach to large-scale anonymity. In Proc. CCS, 2006.
    • (2006) Proc. CCS
    • Nambiar, A.1    Wright, M.2
  • 19
    • 77954344208 scopus 로고    scopus 로고
    • p2psim. http://pdos.csail.mit.edu/p2psim/, 2005.
    • (2005)
  • 20
    • 34248345975 scopus 로고    scopus 로고
    • Privacy-preserving payload-based correlation for accurate malicious traffic detection
    • J. Parekh, K. Wang, and S. Stolfo. Privacy-preserving payload-based correlation for accurate malicious traffic detection. In Proc. LSAD, 2006.
    • (2006) Proc. LSAD
    • Parekh, J.1    Wang, K.2    Stolfo, S.3
  • 21
  • 23
    • 85137546697 scopus 로고    scopus 로고
    • Global intrusion detection in the DOMINO overlay system
    • V. Yegneswaran, P. Barford, and S. Jha. Global intrusion detection in the DOMINO overlay system. In Proc. NDSS, 2004.
    • (2004) Proc. NDSS
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.