메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Infilter: Predictive ingress filtering to detect spoofed IP traffic

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRIME; GATEWAYS (COMPUTER NETWORKS); INTERNET PROTOCOLS; ROUTERS;

EID: 77958147616     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2005.78     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 1
    • 0003247246 scopus 로고
    • A border gateway protocol
    • March
    • Y.Rekhter and T. Li, “A Border Gateway Protocol,” IETF RFC 1771, March 1995.
    • (1995) IETF RFC 1771
    • Rekhter, Y.1    Li, T.2
  • 2
    • 85116479494 scopus 로고    scopus 로고
    • Caida website, http://www.caida.org
  • 4
    • 84878724535 scopus 로고    scopus 로고
    • Waikato Applied Network Dynamics group, “The DAG project" http://dag.cs.waikato.ac.nz
    • The DAG Project
  • 5
  • 6
    • 85116454686 scopus 로고    scopus 로고
    • Flowtools, http://www.splintered.net/sw/flow-tools/
    • Flowtools
  • 7
    • 84883099069 scopus 로고    scopus 로고
    • Internet Draft, IETF Intrusion Detection Exchange Format Working Group
    • “The Intrusion Detection Message Exchange Format” Internet Draft, IETF Intrusion Detection Exchange Format Working Group, http://www.ietf.org/html.charters/idwgcharter.html
    • The Intrusion Detection Message Exchange Format
  • 8
    • 0037492265 scopus 로고    scopus 로고
    • Efficient search for approximate nearest neighbor in high dimensional spaces
    • Eyal Kushilevitz, Rafail Ostrovsky, Yuval Rabani. “Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces” SIAM J. Comput. 30(2): 457-474 (2000)
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 457-474
    • Kushilevitz, E.1    Ostrovsky, R.2    Rabani, Y.3
  • 14
    • 85116428322 scopus 로고    scopus 로고
    • NLANR website, http://www.nlanr.net
  • 15
    • 85116443530 scopus 로고    scopus 로고
    • NMAP http://www.insecure.org/nmap
    • NMAP
  • 16
    • 0003276078 scopus 로고    scopus 로고
    • OSPF version 2
    • April
    • J. Moy, “OSPF Version 2,” RFC 2328, April 1998.
    • (1998) RFC 2328
    • Moy, J.1
  • 17
    • 0038729330 scopus 로고    scopus 로고
    • Protection from Distributed Denial of Service Attack Using History-based IP Filtering
    • Anchorage, Alaska, USA, May
    • T. Peng, C. Leckie and R. Kotagiri. “Protection from Distributed Denial of Service Attack Using History-based IP Filtering” IEEE International Conference on Communications (ICC 2003), Anchorage, Alaska, USA, May, 2003.
    • (2003) IEEE International Conference on Communications (ICC 2003)
    • Peng, T.1    Leckie, C.2    Kotagiri, R.3
  • 18
    • 85116476561 scopus 로고    scopus 로고
    • University of Oregon
    • Routeviews project, University of Oregon, http://www.routeviews.org
  • 19
    • 0742276097 scopus 로고    scopus 로고
    • Inside the slammer worm
    • July
    • David Moore, et al, “Inside the Slammer Worm” IEEE Security and Privacy, 1(4):33-39, July 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 33-39
    • Moore, D.1
  • 20
    • 78650906899 scopus 로고    scopus 로고
    • Snort IDS, http://www.snort.org
    • Snort IDS
  • 24
    • 85116465210 scopus 로고    scopus 로고
    • Cisco URPF Document, ftp://ftpeng.cisco.com/cons/isp/security/URPF-ISP.pdf
    • Cisco URPF Document
  • 25
    • 0031247411 scopus 로고    scopus 로고
    • End-to-end routing behavior in the internet
    • October
    • V. Paxson, “End-to-end Routing Behavior in the Internet,” IEEE/ACM Transactions on Networking, Vol. 5, No. 5, October 1997.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.5
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.