메뉴 건너뛰기




Volumn , Issue , 2009, Pages 248-252

Intrusive behavior analysis based on honey pot tracking and ant algorithm analysis

Author keywords

Ant colony algorithm; Honey pot; Information security; Internet hijacking; Intrusive behavior

Indexed keywords

ANT ALGORITHMS; ANT COLONY ALGORITHMS; BEHAVIOR ANALYSIS; HONEYPOTS; INFORMATION SECURITY; SECURITY PARAMETERS; SECURITY SETTINGS;

EID: 72849148484     PISSN: 10716572     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCST.2009.5335531     Document Type: Conference Paper
Times cited : (10)

References (5)
  • 1
    • 33750520151 scopus 로고    scopus 로고
    • A. Ajith A., J. Ravi, T. Johnson., et al, D-SCIDS: Distributed soft computing intrusion detection system, Journal of Network and Computer Applications, 30, pp. 81-98, 2007.
    • A. Ajith A., J. Ravi, T. Johnson., et al, "D-SCIDS: Distributed soft computing intrusion detection system", Journal of Network and Computer Applications, Vol. 30, pp. 81-98, 2007.
  • 2
    • 72849142953 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Ant-colony-algorithm
  • 3
    • 72849148166 scopus 로고    scopus 로고
    • K. Praveen Kumar Rao Ms. P. Kamakshi, Ant-Colony Optimization Algorithm for Computer Intrusion Detection, International Advanced Database Conference 2006, San Diego, U.S.A., June 27-29, 2006.
    • K. Praveen Kumar Rao Ms. P. Kamakshi, "Ant-Colony Optimization Algorithm for Computer Intrusion Detection", International Advanced Database Conference 2006, San Diego, U.S.A., June 27-29, 2006.
  • 4
    • 72849116734 scopus 로고    scopus 로고
    • th Edition, Wiley Publishing, Inc., 2008.
    • th Edition, Wiley Publishing, Inc., 2008.
  • 5
    • 30644463214 scopus 로고    scopus 로고
    • The Honeynet Project, May 2005
    • The Honeynet Project, "Know Your Enemy: Honeynets (May 2005)", http://www.honeynet.org/papers/honeynet/.
    • Know Your Enemy: Honeynets


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.