메뉴 건너뛰기




Volumn , Issue , 2008, Pages 825-828

NetFlow based intrusion detection system

Author keywords

Abnormal detection; IP flow; NetFlow; Network security; NIDS

Indexed keywords

ABNORMAL DETECTION; COMPLEX METHODS; CURRENT SIGNATURES; FALSE ALARMS; FOCAL POINTS; GLOBAL NETWORKS; HIGH RATE; INTRUSION DETECTION SYSTEMS; IP FLOW; NETFLOW; NETFLOW DATA; NETFLOWS; NETWORK ADMINISTRATOR; NETWORK ATTACK; NETWORK SECURITY PROBLEMS; NIDS; TRAFFIC ANALYSIS;

EID: 70349595517     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MMIT.2008.213     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 2
    • 70349608426 scopus 로고    scopus 로고
    • Deteting Wormsand Abormal Activitie swith NetFlow, 08-16
    • YimingGong, Deteting Wormsand Abormal Activitie swith NetFlow. http://www.securityfocus.com/infocus/1796, 2004-08-16.
    • (2004)
    • Yiming, G.1
  • 3
    • 1242310086 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic [C]
    • Estan C, Savage S, Varghese G. Automatically Inferring Patterns of Resource Consumption in Network Traffic [C]. In Proceeding of SIGCOMM, 2003.
    • (2003) Proceeding of SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 4
    • 70349596029 scopus 로고    scopus 로고
    • Cisco. NetFlow Services and Applications. White Paper
    • Cisco. NetFlow Services and Applications. White Paper, 1999.
    • (1999)
  • 10
    • 0035879674 scopus 로고    scopus 로고
    • Intrusion detection through learning behavior model
    • DOI 10.1016/S0140-3664(00)00364-9, PII S0140366400003649
    • Balajinath B, Raghavan S V. Intrusion detection through learning behavior model[J]. Computer Communications, 2001; 24(12):1202-1212. (Pubitemid 32610612)
    • (2001) Computer Communications , vol.24 , Issue.12 , pp. 1202-1212
    • Balajinath, B.1    Raghavan, S.V.2
  • 11
    • 0003496659 scopus 로고    scopus 로고
    • An immunological model of distributed detection and its application to computer security [D]
    • New Mexico: The University of New Mexico
    • Steven A H. An Immunological Model of Distributed Detection and Its Application to Computer Security [D]. PhD thesis. New Mexico: The University of New Mexico, 1999
    • (1999) PhD Thesis
    • Steven, A.H.1
  • 12
    • 70349597312 scopus 로고    scopus 로고
    • Common Intrusion Detection Framework EB/OL, 10-08
    • Chen S. Common Intrusion Detection Framework [EB/OL]. http://seclab.cs.ucdavis.edu/cidf, 2000-10-08
    • (2000)
    • Chen, S.1
  • 13
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and mulit sensor data fusion creating cyberspace situational awareness[J]
    • BASS T. Intrusion detection systems and mulit sensor data fusion creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4):99-105
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 14
    • 70349608005 scopus 로고    scopus 로고
    • RFC3176, A method of monitoring trafic in switched and muted newtorks S
    • RFC3176, A method of monitoring trafic in switched and muted newtorks[S]


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.