메뉴 건너뛰기




Volumn 59, Issue 12, 2010, Pages 1655-1668

Localization attacks to internet threat monitors: Modeling and countermeasures

Author keywords

defense; Internet threat monitoring systems; localization attack; modeling

Indexed keywords

INFORMATION THEORY; MODELS; MONITORING; NETWORK SECURITY;

EID: 78149241149     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2010.88     Document Type: Article
Times cited : (16)

References (36)
  • 2
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDOS attack and DDOS defense mechanisms
    • Apr
    • J. Mirkovic and P. Reiher, "A Taxonomy of DDOS Attack and DDOS Defense Mechanisms", ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 2, pp. 39-53, Apr. 2004.
    • (2004) ACM SIGCOMM Computer Comm. Rev. , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 3
    • 78149238766 scopus 로고    scopus 로고
    • Internet Security News
    • Internet Security News, http://www.landfield.com/isn/mailarchive/2001/ Feb/0037.html, 2008.
    • (2008)
  • 4
    • 78149267774 scopus 로고    scopus 로고
    • SANS, Internet Storm Center
    • SANS, Internet Storm Center, http://isc.sans.org/, 2010.
    • (2010)
  • 12
    • 51349164941 scopus 로고    scopus 로고
    • Iloc: An invisible localization attack to internet threat monitoring systems
    • Apr
    • X. Wang, W. Yu, X. Fu, D. Xuan, and W. Zhao, "Iloc: An Invisible Localization Attack to Internet Threat Monitoring Systems", Proc. IEEE INFOCOM (Mini-Conf.), Apr. 2008.
    • (2008) Proc. IEEE INFOCOM (Mini-conf.)
    • Wang, X.1    Yu, W.2    Fu, X.3    Xuan, D.4    Zhao, W.5
  • 18
    • 0020128340 scopus 로고
    • Theory of spread-spectrum communication: Tutorial
    • May
    • R. K. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of Spread-Spectrum Communication: Tutorial", IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, May 1982.
    • (1982) IEEE Trans. Comm. , vol.30 , Issue.5 , pp. 855-884
    • Pickholtz, R.K.1    Schilling, D.L.2    Milstein, L.B.3
  • 23
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • Aug
    • T. Lane and C. E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection", ACM Trans. Information and System Security, vol. 2, no. 3, pp. 295-331, Aug. 1999.
    • (1999) ACM Trans. Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 26
    • 78149244680 scopus 로고    scopus 로고
    • CAIDA, Telescope Analysis
    • CAIDA, Telescope Analysis, http://www.caida.org/analysis/security/ telescope, 2010.
    • (2010)
  • 27
    • 78149235728 scopus 로고    scopus 로고
    • myNetWatchman, myNetWatchman Project
    • myNetWatchman, myNetWatchman Project, http://www.mynetwatchman.com, 2010.
    • (2010)
  • 32
    • 85086055947 scopus 로고    scopus 로고
    • A risk based approach to limit the effects of covert channels for internet sensor data aggregators for sensor privacy
    • June
    • C. Viecco and J. Camp, "A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy", Proc. Third IFIP WG 11.11 Int'l Conf. Trust Management (TM), June 2009.
    • (2009) Proc. Third IFIP WG 11.11 Int'l Conf. Trust Management (TM)
    • Viecco, C.1    Camp, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.