메뉴 건너뛰기




Volumn 12, Issue 3, 2010, Pages 343-356

An overview of IP flow-based intrusion detection

Author keywords

attacks; Botnets; DoS; intrusion detection; Network flows; scan; worms

Indexed keywords

BOTNET; DENIAL-OF-SERVICE ATTACK; SURVEYS;

EID: 77955469676     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2010.032210.00054     Document Type: Article
Times cited : (383)

References (82)
  • 1
    • 85177019660 scopus 로고    scopus 로고
    • 2007 mal ware report: The economic impact of viruses, Spyware, adware, botnets, and other malicious code Jul. 2008 Computer Economics http://www.computereconomics.com
    • (2008)
  • 2
    • 85176992509 scopus 로고    scopus 로고
    • M. Roesch Snort, intrusion detection system Jul. 2008 http://www.snort.org
    • (2008)
    • Roesch, M.1
  • 3
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • V. Paxson Bro: a system for detecting network intruders in real-time Computer Networks 31 23-24 2435 2463 1999
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 4
    • 33845474264 scopus 로고    scopus 로고
    • A parallel intrusion detection system for high-speed networks
    • H. Lai S. Cai H. Huang J. Xie H. Li A parallel intrusion detection system for high-speed networks Proc. of the Second International Conference Applied Cryptography and Network Security (ACNS'04) 439 451 Proc. of the Second International Conference Applied Cryptography and Network Security (ACNS'04) 2004-May
    • (2004) , pp. 439-451
    • Lai, H.1    Cai, S.2    Huang, H.3    Xie, J.4    Li, H.5
  • 5
    • 33751089862 scopus 로고    scopus 로고
    • Efficient packet matching for gigabit network intrusion detection using TCAMs
    • M. Gao Κ. Zhang J. Lu Efficient packet matching for gigabit network intrusion detection using TCAMs Proc. of 20th International Conferece on Advanced Information Networking and Applications (AINA'06) 249 254 Proc. of 20th International Conferece on Advanced Information Networking and Applications (AINA'06) 2006
    • (2006) , pp. 249-254
    • Gao, M.1    Zhang, Κ.2    Lu, J.3
  • 6
    • 0024984013 scopus 로고
    • A network security monitor
    • L. Heberlein G. Dias Κ. Levitt Β. Mukherjee J. Wood D. Wolber A network security monitor Proc. of IEEE Computer Society Symposium on Research in Security and Privacy 296 304 Proc. of IEEE Computer Society Symposium on Research in Security and Privacy 1990-May
    • (1990) , pp. 296-304
    • Heberlein, L.1    Dias, G.2    Levitt, Κ.3    Mukherjee, Β.4    Wood, J.5    Wolber, D.6
  • 7
    • 0000949239 scopus 로고    scopus 로고
    • GrIDS - a graph based intrusion detection system for large networks
    • S. Stanford-Chen S. Cheung R. Crawford M. Dilger J. Frank J. Hoagl K. Levitt C. Wee R. Yip D. Zerkle GrIDS-a graph based intrusion detection system for large networks Proc. of the 19th National Information Systems Security Conference (NISS '96) 361 370 Proc. of the 19th National Information Systems Security Conference (NISS '96) 1996
    • (1996) , pp. 361-370
    • Stanford-Chen, S.1    Cheung, S.2    Crawford, R.3    Dilger, M.4    Frank, J.5    Hoagl, J.6    Levitt, K.7    Wee, C.8    Yip, R.9    Zerkle, D.10
  • 8
    • 85176991816 scopus 로고    scopus 로고
    • Cisco IOS NetFlow Configuration Guide, Release 12.4 Jul. 2008 Cisco.com http://www.cisco.com
    • (2008)
  • 9
    • 33847789378 scopus 로고    scopus 로고
    • Cisco Systems NetFlow Services Export Version 9
    • B. Claise Cisco Systems NetFlow Services Export Version 9 Jul. 2008 RFC 3954 http: //www.ietf. org/rfc/rfc3954. txt
    • (2008)
    • Claise, B.1
  • 10
    • 34250642066 scopus 로고    scopus 로고
    • Requirements for IP Flow Information Export (IPFIX)
    • J. Quittek T. Zseby B. Claise S. Zander Requirements for IP Flow Information Export (IPFIX) Jul. 2008 RFC 3917 http://www.ietf.org/rfc/rfc3917.txt
    • (2008)
    • Quittek, J.1    Zseby, T.2    Claise, B.3    Zander, S.4
  • 11
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar M. Dacier A. Wespi Towards a taxonomy of intrusion-detection systems Computer Networks 31 9 805 822 Apr. 1999
    • (1999) Computer Networks , vol.31 , Issue.9 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 12
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • H. Debar M. Dacier A. Wespi A revised taxonomy for intrusion detection systems Annales des Telecommunications 55 7-8 361 378 Jul. 2000
    • (2000) Annales des Telecommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 13
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • S. Axelsson Intrusion detection systems: A survey and taxonomy Mar. 2000 99-15 Chalmers Univ.
    • (2000)
    • Axelsson, S.1
  • 14
    • 35548944839 scopus 로고    scopus 로고
    • Intrusion detection: Introduction to intrusion detection and security information management
    • H. Debar J. Viinikka Intrusion detection: Introduction to intrusion detection and security information management Foundations of Security Analysis and Design III 207 236 Sep. 2005
    • (2005) Foundations of Security Analysis and Design III , pp. 207-236
    • Debar, H.1    Viinikka, J.2
  • 16
    • 85176993902 scopus 로고    scopus 로고
    • CERT Coordination Center Jul. 2008 http://www.cert.org/certcc.html
    • (2008)
  • 17
    • 85177015383 scopus 로고    scopus 로고
    • Internet2 NetFlow Weekly Reports Jul. 2008 http://netflow.internet2.edu/weekly
    • (2008)
  • 18
    • 14844312929 scopus 로고    scopus 로고
    • Operational experiences with high-volume network intrusion detection
    • H. Dreger A. Feldmann V. Paxson R. Sommer Operational experiences with high-volume network intrusion detection Proc. SIGSAC: 11th ACM Conference on Computer and Communications Security (CSS'04) 2 11 Proc. SIGSAC: 11th ACM Conference on Computer and Communications Security (CSS'04) 2004
    • (2004) , pp. 2-11
    • Dreger, H.1    Feldmann, A.2    Paxson, V.3    Sommer, R.4
  • 19
    • 38549179979 scopus 로고    scopus 로고
    • Combating against attacks on encrypted protocols
    • Z. Fadlullah T. Taleb N. Ansari K. Hashimoto Y. Y. Miyake Y. Nemoto N. Kato Combating against attacks on encrypted protocols IEEE International Conference on Communications (ICC '07) 1211 1216 IEEE International Conference on Communications (ICC '07) 2007-June
    • (2007) , pp. 1211-1216
    • Fadlullah, Z.1    Taleb, T.2    Ansari, N.3    Hashimoto, K.4    Miyake, Y.Y.5    Nemoto, Y.6    Kato, N.7
  • 20
    • 36849007415 scopus 로고    scopus 로고
    • Tracing back attacks against encrypted protocols
    • T. Taleb Z. M. Fadlullah K. Hashimoto Y. Nemoto N. Kato Tracing back attacks against encrypted protocols Proc. of the 2007 international conference on Wireless communications and mobile computing (IWCMC '07) 121 126 Proc. of the 2007 international conference on Wireless communications and mobile computing (IWCMC '07) 2007
    • (2007) , pp. 121-126
    • Taleb, T.1    Fadlullah, Z.M.2    Hashimoto, K.3    Nemoto, Y.4    Kato, N.5
  • 21
    • 34748855477 scopus 로고    scopus 로고
    • Adaptive network flow clustering
    • S. Song Z. Chen Adaptive network flow clustering IEEE International Conference on Networking, Sensing and Control (ICNSC07) 596 601 IEEE International Conference on Networking, Sensing and Control (ICNSC07) 2007-April
    • (2007) , pp. 596-601
    • Song, S.1    Chen, Z.2
  • 22
    • 43949095595 scopus 로고    scopus 로고
    • Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information
    • B. Claise Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information Jul. 2008 RFC 5101 http://www.ietf.org/rfc/rfc5101.txt
    • (2008)
    • Claise, B.1
  • 23
    • 49949106273 scopus 로고    scopus 로고
    • Conceptual integration of flow-based and packet-based network intrusion detection
    • G. Schaffrath B. Stiller Conceptual integration of flow-based and packet-based network intrusion detection Proc. of 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS '08) 190 194 Proc. of 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS '08) 2008
    • (2008) , pp. 190-194
    • Schaffrath, G.1    Stiller, B.2
  • 24
    • 34748885697 scopus 로고    scopus 로고
    • Finding elephant flows for optical networks
    • T. Fioreze M. O. Wolbers R. van de Meent A. Pras Finding elephant flows for optical networks Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM '07) 627 640 Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM '07) 2007-May
    • (2007) , pp. 627-640
    • Fioreze, T.1    Wolbers, M.O.2    van de Meent, R.3    Pras, A.4
  • 25
    • 85177004040 scopus 로고    scopus 로고
    • Evaluation of Candidate Protocols for IP Flow Information Export (IPFIX)
    • S. Leinen Evaluation of Candidate Protocols for IP Flow Information Export (IPFIX) Jul 2008 RFC 3955
    • (2008)
    • Leinen, S.1
  • 26
    • 85177017940 scopus 로고    scopus 로고
    • Packet Sampling (PSAMP) working group Jul. 2008 http://www.ietf.org/html.charters/psamp-charter.html
    • (2008)
  • 27
    • 34547464544 scopus 로고    scopus 로고
    • Impact of packet sampling on anomaly detection metrics
    • D. Brauckhoff Β. Tellenbach A. Wagner M. May A. Lakhina Impact of packet sampling on anomaly detection metrics Proc. of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06) 159 164 Proc. of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06) 2006
    • (2006) , pp. 159-164
    • Brauckhoff, D.1    Tellenbach, Β.2    Wagner, A.3    May, M.4    Lakhina, A.5
  • 28
    • 34547488856 scopus 로고    scopus 로고
    • Is sampled data sufficient for anomaly detection?
    • J. Mai C.-N. Chuah A. Sridharan T. Ye H. Zang Is sampled data sufficient for anomaly detection? Proc. of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06) 165 176 Proc. of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06) 2006
    • (2006) , pp. 165-176
    • Mai, J.1    Chuah, C.-N.2    Sridharan, A.3    Ye, T.4    Zang, H.5
  • 29
    • 43949115202 scopus 로고    scopus 로고
    • Packet sampling for flow accounting: Challenges and limitations
    • T. Zseby T. Hirsch B. Claise Packet sampling for flow accounting: Challenges and limitations Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 61 71 Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 2008
    • (2008) , pp. 61-71
    • Zseby, T.1    Hirsch, T.2    Claise, B.3
  • 30
    • 34547275093 scopus 로고    scopus 로고
    • Sampling time-dependent parameters in high-speed network monitoring
    • E. Izkue E. Magaña Sampling time-dependent parameters in high-speed network monitoring Proc. of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks (PM2HW2N '06) 13 17 Proc. of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks (PM2HW2N '06) 2006
    • (2006) , pp. 13-17
    • Izkue, E.1    Magaña, E.2
  • 31
    • 33746644590 scopus 로고    scopus 로고
    • Easily-implemented adaptive packet sampling for high speed networks flow measurement
    • H. Wang Y. Lin Y. Jin S. Cheng Easily-implemented adaptive packet sampling for high speed networks flow measurement Proc. of 6th International Conference on Computational Science (ICCS'06) 128 135 Proc. of 6th International Conference on Computational Science (ICCS'06) 2006
    • (2006) , pp. 128-135
    • Wang, H.1    Lin, Y.2    Jin, Y.3    Cheng, S.4
  • 32
    • 27944511551 scopus 로고    scopus 로고
    • An in-depth, analytical study of sampling techniques for self-similar internet traffic
    • G. He J. C. Hou An in-depth, analytical study of sampling techniques for self-similar internet traffic Proc.of 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) 404 413 Proc.of 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) 2005
    • (2005) , pp. 404-413
    • He, G.1    Hou, J.C.2
  • 33
    • 2442583610 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
    • C. Estan G. Varghese New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice ACM Transactions on Computer Systems (TOCS) 21 3 270 313 2003
    • (2003) ACM Transactions on Computer Systems (TOCS) , vol.21 , Issue.3 , pp. 270-313
    • Estan, C.1    Varghese, G.2
  • 35
    • 18544383616 scopus 로고    scopus 로고
    • Learn more, sample less: control of volume and variance in network measurement
    • N. Duffield C. Lund M. Thorup Learn more, sample less: control of volume and variance in network measurement IEEE Transactions on Information Theory 51 5 1756 1775 May 2005
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.5 , pp. 1756-1775
    • Duffield, N.1    Lund, C.2    Thorup, M.3
  • 36
    • 33244459147 scopus 로고    scopus 로고
    • Estimating arbitrary subset sums with few probes
    • N. Alon N. Duffield C. Lund M. Thorup Estimating arbitrary subset sums with few probes Proc. of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '05) 317 325 Proc. of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '05) 2005
    • (2005) , pp. 317-325
    • Alon, N.1    Duffield, N.2    Lund, C.3    Thorup, M.4
  • 37
    • 68949173234 scopus 로고    scopus 로고
    • Taxonomies of attacks and vulnerabilities in computer systems
    • V. Igure R. Williams Taxonomies of attacks and vulnerabilities in computer systems Communications Surveys & Tutorials, IEEE 10 1 6 19 2008
    • (2008) Communications Surveys & Tutorials, IEEE , vol.10 , Issue.1 , pp. 6-19
    • Igure, V.1    Williams, R.2
  • 38
    • 12244311689 scopus 로고    scopus 로고
    • A taxonomy of computer worms
    • N. Weaver V. Paxson S. Stamford R. Cunningham A taxonomy of computer worms Proc. of2003 ACM workshop on Rapid malcode (WORM'03) 11 18 Proc. of2003 ACM workshop on Rapid malcode (WORM'03) 2003
    • (2003) , pp. 11-18
    • Weaver, N.1    Paxson, V.2    Stamford, S.3    Cunningham, R.4
  • 39
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • S. Hansman R. Hunt A taxonomy of network and computer attacks Computers & Security 24 1 31 43 Feb. 2005
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 41
    • 85177016574 scopus 로고    scopus 로고
    • Carnegie Mellon University
    • J. D. Howard An analysis of security incidents on the internet 1989-1995 1998 Carnegie Mellon University
    • (1998)
    • Howard, J.D.1
  • 42
    • 85177021195 scopus 로고    scopus 로고
    • Countering the Largest Security Threat
    • Botnet Detection Spinger
    • Countering the Largest Security Threat 36 2008 Spinger Botnet Detection
    • (2008) , vol.36
  • 43
    • 67650349218 scopus 로고    scopus 로고
    • A taxonomy of botnet structures
    • D. Dagon G. Gu C. Lee A taxonomy of botnet structures Botnet Detection 36 143 164 Oct. 2007
    • (2007) Botnet Detection , vol.36 , pp. 143-164
    • Dagon, D.1    Gu, G.2    Lee, C.3
  • 45
    • 0343036502 scopus 로고
    • AINT misbehaving - A taxonomy of anti-intrusion techniques
    • L. R. Halme R. K. Bauer AINT misbehaving-A taxonomy of anti-intrusion techniques Proc. of 18th NIST-NCSC National Information Systems Security Conference 163 172 Proc. of 18th NIST-NCSC National Information Systems Security Conference 1995
    • (1995) , pp. 163-172
    • Halme, L.R.1    Bauer, R.K.2
  • 46
    • 33947608017 scopus 로고    scopus 로고
    • Intrusion detection and virology: an analysis of differences, similarities and complementariness
    • B. Morin L. Mé Intrusion detection and virology: an analysis of differences, similarities and complementariness Journal in Computer Virology 3 39 49 Apr. 2007
    • (2007) Journal in Computer Virology , vol.3 , pp. 39-49
    • Morin, B.1    Mé, L.2
  • 48
    • 44149118912 scopus 로고    scopus 로고
    • Intrusion techniques: Comparative study of network intrusion detection systems
    • M. Garuba C. Liu D. Fraites Intrusion techniques: Comparative study of network intrusion detection systems Proc. of 5th International Conference on Information Technology: New Generations (ITNG '08) 592 598 Proc. of 5th International Conference on Information Technology: New Generations (ITNG '08) 2008-Apr.
    • (2008) , pp. 592-598
    • Garuba, M.1    Liu, C.2    Fraites, D.3
  • 49
    • 85177010430 scopus 로고    scopus 로고
    • Consolidation and evaluation of IDS taxonomies
    • M. Almgren E. L. Barse E. Jonsson Consolidation and evaluation of IDS taxonomies Proc. of 8th Nordic Workshop on Secure IT systems (NordSec '03) Proc. of 8th Nordic Workshop on Secure IT systems (NordSec '03) 2003-Oct.
    • (2003)
    • Almgren, M.1    Barse, E.L.2    Jonsson, E.3
  • 51
    • 85177010525 scopus 로고    scopus 로고
    • Z. Li Y. Gao Y. Chen Towards a highspeed router-based anomaly/intrusion detection system Aug. 2005 http://conferences.sigcomm.org/sigcomm/2005/poster-121.pdf
    • (2005)
    • Li, Z.1    Gao, Y.2    Chen, Y.3
  • 52
    • 84882757196 scopus 로고    scopus 로고
    • A dos resilient flow-level intrusion detection approach for high-speed networks
    • Y. Gao Ζ. Li Y. Chen A dos resilient flow-level intrusion detection approach for high-speed networks Proc. of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06) 39 Proc. of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06) 2006
    • (2006) , pp. 39
    • Gao, Y.1    Li, Ζ.2    Chen, Y.3
  • 53
    • 85132972574 scopus 로고    scopus 로고
    • Distributed denial of service: Taxonomies of attacks, tools, and countermeasures
    • S. M. Specht R. B. Lee Distributed denial of service: Taxonomies of attacks, tools, and countermeasures Proc. of the ISCA 17th International Conference on Parallel and Distributed Computing Systems (ISCA ΡDCS'04) 543 550 Proc. of the ISCA 17th International Conference on Parallel and Distributed Computing Systems (ISCA ΡDCS'04) 2004-Sep.
    • (2004) , pp. 543-550
    • Specht, S.M.1    Lee, R.B.2
  • 54
    • 33749821117 scopus 로고    scopus 로고
    • Detection of super sources and destinations in high-speed networks: Algorithms, analysis and evaluation
    • Q. Zhao J. Xu A. Kumar Detection of super sources and destinations in high-speed networks: Algorithms, analysis and evaluation IEEE Journal on Selected Areas in Communications 24 10 1840 1852 Oct. 2006
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1840-1852
    • Zhao, Q.1    Xu, J.2    Kumar, A.3
  • 55
    • 4544268957 scopus 로고    scopus 로고
    • A flow-based method for abnormal network traffic detection
    • M.-S. Kim H.-J. Kong S.-C. Hong S.-H. Chung J. Hong A flow-based method for abnormal network traffic detection Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS'04) 599 612 Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS'04) 2004-Apr.
    • (2004) , pp. 599-612
    • Kim, M.-S.1    Kong, H.-J.2    Hong, S.-C.3    Chung, S.-H.4    Hong, J.5
  • 56
    • 34748852070 scopus 로고    scopus 로고
    • Real-time analysis of flow data for network attack detection
    • G. Münz G. Carle Real-time analysis of flow data for network attack detection Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM'07) 100 108 Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM'07) 2007
    • (2007) , pp. 100-108
    • Münz, G.1    Carle, G.2
  • 57
    • 85177015620 scopus 로고    scopus 로고
    • Diadem Firewall European Project Jul. 2008 http://www.diadem-firewall.org
    • (2008)
  • 58
    • 14944367267 scopus 로고    scopus 로고
    • Characterization of network-wide anomalies in traffic flows
    • C. D. A. Lakhina M. Crovella Characterization of network-wide anomalies in traffic flows Proc. of 4th ACM SIGCOMM conference on Internet measurement (IMC '04) 201 206 Proc. of 4th ACM SIGCOMM conference on Internet measurement (IMC '04) 2004
    • (2004) , pp. 201-206
    • Lakhina, C.D.A.1    Crovella, M.2
  • 59
  • 61
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • A. Lakhina M. Crovella C. Diot Diagnosing network-wide traffic anomalies Proc. of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '04) 4 219 230 Proc. of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '04) 2004
    • (2004) , Issue.4 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 62
    • 85177004963 scopus 로고    scopus 로고
    • Sprint.net Jul. 2008 http://www.sprint.net
    • (2008)
  • 63
    • 56649102068 scopus 로고    scopus 로고
    • Anomaly characterization in flow-based traffic time series
    • A. Sperotto R. Sadre A. Pras Anomaly characterization in flow-based traffic time series Proc. of the 8th IEEE International Workshop on IP Operations and Management, IPOM 2008 15 27 Proc. of the 8th IEEE International Workshop on IP Operations and Management, IPOM 2008 Samos Greece 2008-Sep.
    • (2008) , pp. 15-27
    • Sperotto, A.1    Sadre, R.2    Pras, A.3
  • 64
    • 85177022596 scopus 로고    scopus 로고
    • SURFnet Jul. 2008 www.surfnet.nl
    • (2008)
  • 65
    • 33846200876 scopus 로고    scopus 로고
    • Entropy based worm and anomaly detection in fast IP networks
    • A. Wagner B. Plattner Entropy based worm and anomaly detection in fast IP networks Proc. of 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE '05) 172 177 Proc. of 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE '05) 2005-June
    • (2005) , pp. 172-177
    • Wagner, A.1    Plattner, B.2
  • 66
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon A mathematical theory of communication The Bell System Technical Journal 27 3 379 423 1948
    • (1948) The Bell System Technical Journal , vol.27 , Issue.3 , pp. 379-423
    • Shannon, C.E.1
  • 67
    • 34547284915 scopus 로고    scopus 로고
    • Scan detection on very large networks using logistic regression modeling
    • C. Gates J. McNutt J. Kadane M. Kellner Scan detection on very large networks using logistic regression modeling Proc. of 11th IEEE Symposium on Computers and Communications (ISCC'06) 402 408 Proc. of 11th IEEE Symposium on Computers and Communications (ISCC'06) 2006
    • (2006) , pp. 402-408
    • Gates, C.1    McNutt, J.2    Kadane, J.3    Kellner, M.4
  • 68
    • 43949111011 scopus 로고    scopus 로고
    • A two-layered anomaly detection technique based on multi-modal flow behavior models
    • M. Stoecklin J.-Y. L. Boudec A. Kind A two-layered anomaly detection technique based on multi-modal flow behavior models Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 212 221 Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 2008
    • (2008) , pp. 212-221
    • Stoecklin, M.1    Boudec, J.-Y.L.2    Kind, A.3
  • 69
    • 33846190721 scopus 로고    scopus 로고
    • Host behaviour based early detection of worm outbreaks in internet backbones
    • T. Dübendorfer B. Plattner Host behaviour based early detection of worm outbreaks in internet backbones Proc. of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) 166 171 Proc. of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) 2005
    • (2005) , pp. 166-171
    • Dübendorfer, T.1    Plattner, B.2
  • 70
    • 85177018656 scopus 로고    scopus 로고
    • A framework for real-time worm attack detection and backbone monitoring
    • T. Dübendorfer A. Wagner B. Plattner A framework for real-time worm attack detection and backbone monitoring Proc.of 1st IEEE International Workshop on Critical Infrastructure Protection (IWCIP' 05) Proc.of 1st IEEE International Workshop on Critical Infrastructure Protection (IWCIP' 05) 2005-Nov.
    • (2005)
    • Dübendorfer, T.1    Wagner, A.2    Plattner, B.3
  • 71
    • 18844395616 scopus 로고    scopus 로고
    • Experiences with worm propagation simulations
    • A. Wagner T. Dübendorfer Β. Plattner R. Hiestand Experiences with worm propagation simulations Proc. of 2003 ACM workshop on Rapid malcode (WORM'03) 34 41 Proc. of 2003 ACM workshop on Rapid malcode (WORM'03) 2003
    • (2003) , pp. 34-41
    • Wagner, A.1    Dübendorfer, T.2    Plattner, Β.3    Hiestand, R.4
  • 72
    • 38049088466 scopus 로고    scopus 로고
    • An approach for classifying internet worms based on temporal behaviors and packet flows
    • M. Lee T. Shon K. Cho M. Chung J. Seo J. Moon An approach for classifying internet worms based on temporal behaviors and packet flows Proc. of 3rd Int. Conf. on Intelligent Computing (ICIC 2007) 646 655 Proc. of 3rd Int. Conf. on Intelligent Computing (ICIC 2007) 2007
    • (2007) , pp. 646-655
    • Lee, M.1    Shon, T.2    Cho, K.3    Chung, M.4    Seo, J.5    Moon, J.6
  • 73
    • 0038349210 scopus 로고    scopus 로고
    • Code red worm propagation modeling and analysis
    • C. Zou W. Gong D. Towsley Code red worm propagation modeling and analysis Proc. of 17th USENIX Security Symposium (USENIX Security '08) 138 147 Proc. of 17th USENIX Security Symposium (USENIX Security '08) 2002
    • (2002) , pp. 138-147
    • Zou, C.1    Gong, W.2    Towsley, D.3
  • 74
    • 79955063806 scopus 로고    scopus 로고
    • Flow-based worm detection using correlated honeypot logs
    • F. Dressler W. Jaegers R. German Flow-based worm detection using correlated honeypot logs Proc. of 15th GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007) 181 186 Proc. of 15th GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007) 2007-Feb.
    • (2007) , pp. 181-186
    • Dressler, F.1    Jaegers, W.2    German, R.3
  • 75
    • 38149070087 scopus 로고    scopus 로고
    • Hit-list worm detection and bot identification in large networks using protocol graphs
    • M. Collins M. Reiter Hit-list worm detection and bot identification in large networks using protocol graphs Proc. of 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07) 276 295 Proc. of 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07) 2007
    • (2007) , pp. 276-295
    • Collins, M.1    Reiter, M.2
  • 76
    • 74049084295 scopus 로고    scopus 로고
    • Wide-scale botnet detection and characterization
    • D. H. A. Karasaridis B. Rexroad Wide-scale botnet detection and characterization Proc.of the first conference on First Workshop on Hot Topics in Understanding Botnets (HotBots'07) 1 8 Proc.of the first conference on First Workshop on Hot Topics in Understanding Botnets (HotBots'07) 2007
    • (2007) , pp. 1-8
    • Karasaridis, D.H.A.1    Rexroad, B.2
  • 77
    • 46149123241 scopus 로고    scopus 로고
    • Using machine learning techniques to identify botnet traffic
    • C. Livadas R. Walsh D. Lapsley W. Strayer Using machine learning techniques to identify botnet traffic Proc. of 31st IEEE Conference on Local Computer Networks (LCN'06) 967 974 Proc. of 31st IEEE Conference on Local Computer Networks (LCN'06) 2006
    • (2006) , pp. 967-974
    • Livadas, C.1    Walsh, R.2    Lapsley, D.3    Strayer, W.4
  • 78
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
    • G. Gu R. Perdisci J. Zhang W. Lee Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection Proc. of 17th USENIX Security Symposium (USENIX Security '08) 139 154 Proc. of 17th USENIX Security Symposium (USENIX Security '08) 2008-June
    • (2008) , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 79
    • 77649329707 scopus 로고    scopus 로고
    • Botnet research survey
    • Z. Zhu G. Lu Y. Chen Ζ. Fu P. Roberts K. Han Botnet research survey 32nd Annual IEEE International Computer Software and Applications (COMPSAC '08) 967 972 32nd Annual IEEE International Computer Software and Applications (COMPSAC '08) 2008-Aug.
    • (2008) , pp. 967-972
    • Zhu, Z.1    Lu, G.2    Chen, Y.3    Fu, Ζ.4    Roberts, P.5    Han, K.6
  • 80
    • 85177013705 scopus 로고    scopus 로고
    • Flow-based anti-spam
    • Q. Xiaofeng H. Jihong C. Ming Flow-based anti-spam Proc. of 4th IEEE Workshop on IP Operations and Management (IPOMV4) 99 103 Proc. of 4th IEEE Workshop on IP Operations and Management (IPOMV4) 2004-Oct.
    • (2004) , pp. 99-103
    • Xiaofeng, Q.1    Jihong, H.2    Ming, C.3
  • 81
    • 85177019266 scopus 로고    scopus 로고
    • The state of spam, a monthly report-july 2008 Jul. 2008 Symantec.com http://www.symantec.com/
    • (2008)
  • 82
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • A. Ramachandran N. Feamster Understanding the network-level behavior of spammers SIGCOMM Comput. Commun. Rev. 36 4 291 302 2006
    • (2006) SIGCOMM Comput. Commun. Rev. , vol.36 , Issue.4 , pp. 291-302
    • Ramachandran, A.1    Feamster, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.