메뉴 건너뛰기




Volumn 9, Issue 2, 2009, Pages 143-155

Detecting scanners: Empirical assessment on a 3G network

Author keywords

Anomaly detection; Mobile networks; Scanning detection

Indexed keywords

3G MOBILE NETWORK; ANOMALY DETECTION; EMPIRICAL ASSESSMENT; MALICIOUS AGENT; PASSIVE TRAFFIC MONITORING; PEER TO PEER; REAL TRAFFIC; SELF-PROPAGATING;

EID: 67650339498     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (25)
  • 3
    • 33750309882 scopus 로고    scopus 로고
    • An analysis of the Skype peer-to-peer internet telephony protocol
    • Barcelona, Spain, Apr.
    • S. A. Baset and H. Schulzrinne, "An analysis of the Skype peer-to-peer internet telephony protocol," Proceedings of INFOCOM'06, pp. 1-11, Barcelona, Spain, Apr. 2006.
    • (2006) Proceedings of INFOCOM'06 , pp. 1-11
    • Baset, S.A.1    Schulzrinne, H.2
  • 5
    • 84875308045 scopus 로고    scopus 로고
    • DARWIN home page.
    • DARWIN home page. http://userver.ftw.at/~ricciato/darwin
  • 13
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Philadelphia, USA, July
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," Proceedings of SIGCOMM' 05, pp. 217-228, Philadelphia, USA, July 2005.
    • (2005) Proceedings of SIGCOMM' 05 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 15
    • 33846251940 scopus 로고    scopus 로고
    • SweetBait: Zero-hour worm detection and containment using lowand high-interaction honeypots
    • Apr.
    • G. Portokalidis and H. Bos, "SweetBait: Zero-hour worm detection and containment using lowand high-interaction honeypots, Computer Networks, vol. 51, no. 5, pp. 1256-1274, Apr. 2007.
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1256-1274
    • Portokalidis, G.1    Bos, H.2
  • 16
    • 33646894468 scopus 로고    scopus 로고
    • Unwanted traffic in 3G networks
    • Apr.
    • F. Ricciato, "Unwanted traffic in 3G networks," ACM Computer Communication Review, vol. 36, no. 2, pp. 53-56, Apr. 2006
    • (2006) ACM Computer Communication Review , vol.36 , Issue.2 , pp. 53-56
    • Ricciato, F.1
  • 17
    • 33845951462 scopus 로고    scopus 로고
    • On the impact of unwanted traffic onto a 3G network
    • Privacy and Trust in Pervasive and Ubiquitous Computing (SecPeru'06), Lyon, France, June
    • F. Ricciato, P. Svoboda, E. Hasenleithner, and W. Fleischer, "On the impact of unwanted traffic onto a 3G network," Proceedings of 2nd International workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPeru'06), pp. 49-56, Lyon, France, June 2006.
    • (2006) Proceedings of 2nd International work-shop on Security , pp. 49-56
    • Ricciato, F.1    Svoboda, P.2    Hasenleithner, E.3    Fleischer, W.4
  • 21
    • 84875300083 scopus 로고    scopus 로고
    • SNORT homepage
    • SNORT homepage. http://www.snort.org
  • 24
    • 33846625241 scopus 로고    scopus 로고
    • Honeynets: A tool for counterintelligence in online security
    • Jan.
    • D. Watson, "Honeynets: A tool for counterintelligence in online security," Network Security, vol. 2007, no. 1, pp. 4-8, Jan. 2007.
    • (2007) Network Security , vol.2007 , Issue.1 , pp. 4-8
    • Watson, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.