메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1102-1109

Flow-based front payload aggregation

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; ATTACK DETECTION; ATTACK SIGNATURE; DEGREE OF CONFIDENCE; FLOW DATA; FLOW INFORMATIONS; MONITORING SYSTEM; MONITORING TECHNIQUES; PAYLOAD INFORMATION; PROCESSING PERFORMANCE;

EID: 77951277650     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2009.5355213     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 1
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • December
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Elsevier Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, December 1999.
    • (1999) Elsevier Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 4
    • 1242310086 scopus 로고    scopus 로고
    • Automatically Inferring Patterns of Resource Consumption in Network Traffic
    • Karlsruhe, Germany: ACM, August
    • C. Estan, S. Savage, and G. Varghese, "Automatically Inferring Patterns of Resource Consumption in Network Traffic," in ACM SIGCOMM 2003. Karlsruhe, Germany: ACM, August 2003, pp. 137-148.
    • (2003) ACM SIGCOMM 2003 , pp. 137-148
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 6
    • 49949106273 scopus 로고    scopus 로고
    • Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection
    • Resilient Networks and Services, Second International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008), ser. Bremen, Germany: Springer, July
    • G. Schaffrath and B. Stiller, "Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection," in Resilient Networks and Services, Second International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008), ser. Lecture Notes in Computer Science, vol.5127. Bremen, Germany: Springer, July 2008, pp. 190-194.
    • (2008) Lecture Notes in Computer Science , vol.5127 , pp. 190-194
    • Schaffrath, G.1    Stiller, B.2
  • 12
    • 57349093420 scopus 로고    scopus 로고
    • Predicting the resource consumption of network intrusion detection systems
    • -, "Predicting the resource consumption of network intrusion detection systems," ACM SIGMETRICS Performance Evaluation Review, vol. 36, no. 1, pp. 437-438, 2008.
    • (2008) ACM SIGMETRICS Performance Evaluation Review , vol.36 , Issue.1 , pp. 437-438
  • 13
    • 33846281935 scopus 로고    scopus 로고
    • Exploiting independent state for network intrusion detection
    • DOI 10.1109/CSAC.2005.24, 1565235, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
    • R. Sommer and V. Paxson, "Exploiting Independent State For Network Intrusion Detection," in 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005, pp. 59-71. (Pubitemid 46116464)
    • (2005) Proceedings - Annual Computer Security Applications Conference, ACSAC , vol.2005 , pp. 59-71
    • Sommer, R.1    Paxson, V.2
  • 14
    • 56549099368 scopus 로고    scopus 로고
    • Gnort: High Performance Network Intrusion Detection Using Graphics Processors
    • 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), ser. Cambridge, MA: Springer, September
    • G. Vasiliadis, S. Antonatos, M. Polychronakis, E. P. Markatos, and S. Ioannidis, "Gnort: High Performance Network Intrusion Detection Using Graphics Processors," in 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), ser. Lecture Notes in Computer Science, vol.5230. Cambridge, MA: Springer, September 2008, pp. 116-134.
    • (2008) Lecture Notes in Computer Science , vol.5230 , pp. 116-134
    • Vasiliadis, G.1    Antonatos, S.2    Polychronakis, M.3    Markatos, E.P.4    Ioannidis, S.5
  • 15
    • 65249091864 scopus 로고    scopus 로고
    • Enriching Network Security Analysis with Time Travel
    • New York, NY, USA: ACM Press, August
    • G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Payson, and F. Schneider, "Enriching Network Security Analysis with Time Travel," in ACM SIGCOMM 2008. New York, NY, USA: ACM Press, August 2008, pp. 183-194.
    • (2008) ACM SIGCOMM 2008 , pp. 183-194
    • Maier, G.1    Sommer, R.2    Dreger, H.3    Feldmann, A.4    Payson, V.5    Schneider, F.6
  • 16
    • 0038825042 scopus 로고    scopus 로고
    • Active Mapping: Resisting NIDS Evasion without Altering Traffic
    • Oakland, CA: IEEE
    • U. Shankar and V. Paxson, "Active Mapping: Resisting NIDS Evasion without Altering Traffic," in IEEE Symposium on Security and Privacy. Oakland, CA: IEEE, 2003, pp. 44-61.
    • (2003) IEEE Symposium on Security and Privacy , pp. 44-61
    • Shankar, U.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.