메뉴 건너뛰기




Volumn 20, Issue 11, 2009, Pages 1611-1625

An invisible localization attack to internet threat monitors

Author keywords

Internet threat monitoring systems; Invisible localization attack; PN code; Security

Indexed keywords

DATA CENTERS; EXTENSIVE SIMULATIONS; INVISIBLE LOCALIZATION ATTACK; IP ADDRESSS; MONITOR LOCATION; PERFORMANCE EVALUATION; PN-CODE; PSEUDO-NOISE CODES; REAL-WORLD; SECURITY;

EID: 70350057094     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2008.255     Document Type: Article
Times cited : (20)

References (54)
  • 3
    • 70350085665 scopus 로고    scopus 로고
    • W32/MyDoom.B Virus, http://www.us-cert.gov/cas/techalerts/ TA04-028A.html, 2008.
    • (2008) W32/MyDoom.B Virus
  • 4
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDOS Attack and DDOS Defense Mechanisms
    • J. Mirkovic and P. Reiher, "A Taxonomy of DDOS Attack and DDOS Defense Mechanisms," ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 2, pp. 39-54, 2004.
    • (2004) ACM SIGCOMM Computer Comm. Rev , vol.34 , Issue.2 , pp. 39-54
    • Mirkovic, J.1    Reiher, P.2
  • 5
    • 70350080767 scopus 로고    scopus 로고
    • Internet Security News, http://www.landfield.com/isn/mail-archive/2001/ Feb/0037.html, 2008.
    • (2008) Internet Security News
  • 6
    • 70350083523 scopus 로고    scopus 로고
    • Internet Storm Center, SANS
    • Internet Storm Center, SANS, http://isc.sans.org/, 2008.
    • (2008)
  • 12
    • 70350063419 scopus 로고    scopus 로고
    • myNetWatchman
    • "myNetWatchman," myNetWatchman Project, http:// www.mynetwatchman.com, 2008.
    • (2008) myNetWatchman Project
  • 13
    • 30644463214 scopus 로고    scopus 로고
    • Honeynet Project, http:// project.honeynet.org/papers/honeynet
    • L. Spitzner, Know Your Enemy: Honeynets. Honeynet Project, http:// project.honeynet.org/papers/honeynet, 2008.
    • (2008) Know Your Enemy: Honeynets
    • Spitzner, L.1
  • 23
    • 0020128340 scopus 로고
    • Theory of Spread-Spectrum Communication - Tutorial
    • R.K. Pickholtz, D.L. Schilling, and L.B. Milstein, "Theory of Spread-Spectrum Communication - Tutorial," IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, 1982.
    • (1982) IEEE Trans. Comm , vol.30 , Issue.5 , pp. 855-884
    • Pickholtz, R.K.1    Schilling, D.L.2    Milstein, L.B.3
  • 26
    • 70350076812 scopus 로고    scopus 로고
    • Nova Engineering, Linear Feedback Register Shift, http:// www.sss-mag.com/pdf/lfsr.pdf, 2008.
    • Nova Engineering, Linear Feedback Register Shift, http:// www.sss-mag.com/pdf/lfsr.pdf, 2008.
  • 29
    • 70350065461 scopus 로고    scopus 로고
    • Cryptanalysis, http://en.wikipedia.org/wiki/Cryptanalysis, 2008.
    • (2008) Cryptanalysis
  • 34
    • 34247555884 scopus 로고    scopus 로고
    • Privacy-Preserving Data-Mining Systems
    • Apr
    • N. Zhang and W. Zhao, "Privacy-Preserving Data-Mining Systems," Computer, vol. 40, no. 4, Apr. 2007.
    • (2007) Computer , vol.40 , Issue.4
    • Zhang, N.1    Zhao, W.2
  • 37
    • 70350047971 scopus 로고    scopus 로고
    • CAIDA
    • CAIDA, Telescope Analysis, http://www.caida.org/analysis/security/ telescope, 2008.
    • (2008) Telescope Analysis


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.