메뉴 건너뛰기




Volumn 54, Issue 8, 2010, Pages 1282-1299

HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency

Author keywords

Attack resilience; Data streaming; Intrusion detection; Network monitoring; Network level security and protection; Statistical detection

Indexed keywords

ANALYSIS AND EVALUATION; ATTACK RESILIENCE; BOTNETS; DATA STREAMING; FALSE POSITIVE; FLOW-LEVEL; HIGH SPEED FLOWS; INTRUSION DETECTION APPROACHES; INTRUSION DETECTION SYSTEMS; NETWORK MONITORING; PACKET STREAMS; PORT SCANS; REVERSIBLE SKETCHES; STATISTICAL DETECTION; SYN FLOODING; WORM PROPAGATION;

EID: 77953234751     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2009.10.016     Document Type: Article
Times cited : (24)

References (53)
  • 2
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Hofmeyr S., and Forrest S. Intrusion detection using sequences of system calls. Journal of Computer Security 6 (1998) 151-180
    • (1998) Journal of Computer Security , vol.6 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2
  • 3
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • Paxson V. Bro: a system for detecting network intruders in real-time. Computer Networks 31 23-24 (1999) 2435-2463
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 16
    • 77953285704 scopus 로고    scopus 로고
    • Cisco Inc, Per-Packet Load Balancing
    • Cisco Inc., Per-Packet Load Balancing, 2003. .
    • (2003)
  • 17
    • 77953289525 scopus 로고    scopus 로고
    • Cisco Inc, Load balancing with Cisco Express Forwarding
    • Cisco Inc., Load balancing with Cisco Express Forwarding, 2003. .
    • (2003)
  • 30
    • 77953290784 scopus 로고    scopus 로고
    • P. Barford, J. Kline, D. Plonka, A. Ron, A signal analysis of network traffic anomalies, in: ACM SIGCOMM IMC, 2002.
    • P. Barford, J. Kline, D. Plonka, A. Ron, A signal analysis of network traffic anomalies, in: ACM SIGCOMM IMC, 2002.
  • 40
    • 58149165425 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • S.B. Kuai Xu, Zhi-Li Zhang, Profiling internet backbone traffic: behavior models and applications, in: Proceedings of the ACM SIGCOMM, 2005.
    • (2005) Proceedings of the ACM SIGCOMM
    • Kuai Xu, S.B.1    Li Zhang, Z.2
  • 41
    • 77953287861 scopus 로고    scopus 로고
    • A.C. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan, M.J. Strauss, QuickSAND: quick summary and analysis of network data, Tech. Rep., DIMACS Technical Report 2001-43, 2001.
    • A.C. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan, M.J. Strauss, QuickSAND: quick summary and analysis of network data, Tech. Rep., DIMACS Technical Report 2001-43, 2001.
  • 45
    • 77953286841 scopus 로고    scopus 로고
    • J.D. Brutlag, Aberrant behavior detection in time series for network service monitoring, in: Proceedings of the USNEIX Systems Administration Conference (LISA), 2000.
    • J.D. Brutlag, Aberrant behavior detection in time series for network service monitoring, in: Proceedings of the USNEIX Systems Administration Conference (LISA), 2000.
  • 51
    • 77953289634 scopus 로고    scopus 로고
    • D. Bernstein, SYN Cookies. .
    • D. Bernstein, SYN Cookies. .
  • 53
    • 77953292585 scopus 로고    scopus 로고
    • S. Institute, Dshield.org: Distributed intrusion detection system. .
    • S. Institute, Dshield.org: Distributed intrusion detection system. .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.