메뉴 건너뛰기




Volumn 54, Issue 10, 2011, Pages 1565-1581

Surveying port scans and their detection methodologies

Author keywords

coordinated scanning; OS fingerprinting; TCP IP; UDP

Indexed keywords

DATA SETS; DETECTION APPROACH; EVALUATION CRITERIA; INTERNET PROTOCOL ADDRESS; PORT SCANNING; PORT SCANS; RESEARCH AND DEVELOPMENT; SYSTEM ADMINISTRATORS; TCP/IP; UDP;

EID: 80053510589     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxr035     Document Type: Article
Times cited : (137)

References (75)
  • 3
    • 27544493249 scopus 로고    scopus 로고
    • An experimental evaluation to determine if port scans are precursors to an attack
    • Washington, DC, USA, June 28-July 1. IEEE Computer Society
    • Panjwani, S., Tan, S. and Jarrin, K.M. (2005) An Experimental Evaluation to Determine If Port Scans are Precursors to an Attack. Proc. DSN'05, Washington, DC, USA, June 28-July 1, pp. 602-611. IEEE Computer Society.
    • (2005) Proc. DSN'05 , pp. 602-611
    • Panjwani, S.1    Tan, S.2    Jarrin, K.M.3
  • 5
    • 80053482670 scopus 로고    scopus 로고
    • Portscan detection using netflow data
    • Brno, CZ, . Faculty of Information Technology BUT
    • Gregr, M. (2010) Portscan Detection Using Netflow Data. Proc. EEICT'10, Brno, CZ, pp. 229-233. Faculty of Information Technology BUT.
    • (2010) Proc. EEICT'10 , pp. 229-233
    • Gregr, M.1
  • 6
    • 0242529347 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • Athens, Greece, November 1, ACM
    • Staniford, S., Hoagland, J.A. and McAlerney, J.M. (2000) Practical Automated Detection of Stealthy Portscans. Proc. CCS'00, Athens, Greece, November 1, pp. 1-4. ACM.
    • (2000) Proc. CCS'00 , pp. 1-4
    • Staniford, S.1    Hoagland, J.A.2    McAlerney, J.M.3
  • 7
  • 9
    • 80053525635 scopus 로고    scopus 로고
    • Distributed information gathering
    • hybrid@hotmail.com
    • hybrid@hotmail.com (1999) Distributed information gathering. Phrack Mag., Article 9, 9.
    • (1999) Phrack Mag., Article , vol.9 , pp. 9
  • 10
    • 84906789612 scopus 로고    scopus 로고
    • Idle port scanning and non-interference analysis of network protocol stacks using model checking
    • Washington, DC, USA. USENIX Association
    • Ensafi, R., Park, J.C., Kapur,D. and Crandall, J.R. (2010) Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. Proc. USENIX Security'10, Washington, DC, USA, pp. 257-272. USENIX Association.
    • (2010) Proc. USENIX Security'10 , pp. 257-272
    • Ensafi, R.1    Park, J.C.2    Kapur, D.3    Crandall, J.R.4
  • 12
    • 67649650450 scopus 로고    scopus 로고
    • Analysis techniques for detecting coordinated attacks and probes
    • Santa Clara, CA, USA, April 9-12. USENIX Association
    • Green, J., Marchette, D., Northcutt, S. and Ralph, B. (1999) Analysis Techniques for Detecting Coordinated Attacks and Probes. Proc. WIDNM'99, Santa Clara, CA, USA, April 9-12, pp. 1-9. USENIX Association.
    • (1999) Proc. WIDNM'99 , pp. 1-9
    • Green, J.1    Marchette, D.2    Northcutt, S.3    Ralph, B.4
  • 13
    • 84942250809 scopus 로고    scopus 로고
    • Surveillance detection in high bandwidth environments
    • Washington, DC, USA, April 22-24, IEEE Computer Society
    • Robertson, S., Siegel, E.V., Miller, M. and Stolfo, S.J. (2003) Surveillance Detection in High Bandwidth Environments. Proc. DARPA DISCEX III'03, Washington, DC, USA, April 22-24, pp. 130-139. IEEE Computer Society.
    • (2003) Proc. DARPA DISCEX III'03 , pp. 130-139
    • Robertson, S.1    Siegel, E.V.2    Miller, M.3    Stolfo, S.J.4
  • 14
    • 0024984013 scopus 로고
    • A network security monitor
    • Oakland, CA, USA, May 7-9, IEEE Computer Society
    • Heberlein, T., Dias, G., Levitt, K., Mukherjee, B., Wood, J. and Wolber, D. (1990) A Network Security Monitor. Proc. RISP'90, Oakland, CA, USA, May 7-9, pp. 296-304. IEEE Computer Society.
    • (1990) Proc. RISP'90 , pp. 296-304
    • Heberlein, T.1    Dias, G.2    Levitt, K.3    Mukherjee, B.4    Wood, J.5    Wolber, D.6
  • 15
    • 8644229619 scopus 로고    scopus 로고
    • The art of port scanning
    • Fyodor (1997) The art of port scanning. Phrack Mag., Article 11, 7.
    • (1997) Phrack Mag., Article , vol.11 , pp. 7
    • Fyodor1
  • 16
    • 80053520432 scopus 로고    scopus 로고
    • QoSient. Argus.
    • QoSient. Argus. http://www.qosient.com/argus/.
  • 17
    • 0037710746 scopus 로고    scopus 로고
    • A probabilistic approach to detecting network scans
    • Florence, Italy, April 15-19, IEEE Computer Society
    • Leckie, C. and Kotagiri, R. (2002) A Probabilistic Approach to Detecting Network Scans. Proc. NOMS'02, Florence, Italy, April 15-19, pp. 359-372. IEEE Computer Society.
    • (2002) Proc. NOMS'02 , pp. 359-372
    • Leckie, C.1    Kotagiri, R.2
  • 18
    • 8844256294 scopus 로고    scopus 로고
    • Detecting network portscans through anomaly detection
    • Orlando, FL, USA, April 12
    • Kim, H., Kim, S., Kouritzin, M.A. and Sun,W. (2004) Detecting Network Portscans Through Anomaly Detection. Proc. SPIE 5429, Orlando, FL, USA, April 12, pp. 254-263.
    • (2004) Proc. SPIE 5429 , pp. 254-263
    • Kim, H.1    Kim, S.2    Kouritzin, M.A.3    Sun, W.4
  • 19
    • 0037741425 scopus 로고    scopus 로고
    • A real-time intrusion detection system (ids) for large scale networks and its evaluations
    • Kato, N., Nitou, H., Ohta, K., Mansfield, G. and Nemoto, Y. (1999)A real-time intrusion detection system (ids) for large scale networks and its evaluations. IEICE Trans. Commun., E82-B, 1817-1825.
    • (1999) IEICE Trans. Commun. , vol.E82-B , pp. 1817-1825
    • Kato, N.1    Nitou, H.2    Ohta, K.3    Mansfield, G.4    Nemoto, Y.5
  • 22
    • 34547284915 scopus 로고    scopus 로고
    • Scan detection on very large networks using logistic regression modeling
    • Pula-Cagliari, Sardinia, Italy, June 26-29. IEEE Computer Society
    • Gates, C., McNutt, J.J., Kadane, J.B. and Kellner, M. (2006) Scan Detection on Very Large Networks Using Logistic Regression Modeling. Proc. ISCC'06, Pula-Cagliari, Sardinia, Italy, June 26-29, pp. 402-408. IEEE Computer Society.
    • (2006) Proc. ISCC'06 , pp. 402-408
    • Gates, C.1    McNutt, J.J.2    Kadane, J.B.3    Kellner, M.4
  • 23
    • 0038323501 scopus 로고    scopus 로고
    • Live traffic analysis of TCP/IP gateways
    • San Diego, CA, USA, March. ISOC Press
    • Porras, P. and Valdes, A. (1998) Live Traffic Analysis of TCP/IP Gateways. Proc. ISOC NDSS'98, San Diego, CA, USA, March. ISOC Press.
    • (1998) Proc. ISOC NDSS'98
    • Porras, P.1    Valdes, A.2
  • 24
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Menlo Park, CA 94025, USA, October 22-25. NIST
    • Porras, P.A. and Neumann, P.G. (1997) EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. Proc. NCSC'97, Menlo Park, CA 94025, USA, October 22-25, pp. 353-365. NIST.
    • (1997) Proc. NCSC'97 , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 25
    • 80053556180 scopus 로고    scopus 로고
    • Reconnaissance scan detection heuristics to disrupt the preattack information gathering
    • Paris, France, June 24-26 IEEE Computer Society
    • Udhayan, J., Prabu, M.M., Krishnan, V.A. and Anitha, R. (2009) Reconnaissance Scan Detection Heuristics to Disrupt the Preattack Information Gathering. Proc. N2S'09, Paris, France, June 24-26, pp. 1-5. IEEE Computer Society.
    • (2009) Proc. N2S'09 , pp. 1-5
    • Udhayan, J.1    Prabu, M.M.2    Krishnan, V.A.3    Anitha, R.4
  • 26
    • 85090433665 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection for networks
    • Seattle, WA, USA, November 7-12. USENIX Association
    • Roesch, M. (1999) Snort-lightweight Intrusion Detection for Networks. Proc. LISA'99, Seattle, WA, USA, November 7-12, pp. 229-238. USENIX Association.
    • (1999) Proc. LISA'99 , pp. 229-238
    • Roesch, M.1
  • 27
    • 85086751284 scopus 로고    scopus 로고
    • Scan detection: A data mining approach
    • Sutton Place Hotel, Newport Beach, CA, USA, April 21-23. SIAM
    • Gyorgy, S.U., György, J.S. and Hui, X. (2005) Scan Detection: A Data Mining Approach. Proc. SIAM ICDM'05, Sutton Place Hotel, Newport Beach, CA, USA, April 21-23, pp. 118-129. SIAM.
    • (2005) Proc SIAM ICDM'05 , pp. 118-129
    • Gyorgy, S.U.1    György, J.S.2    Hui, X.3
  • 28
    • 80053516719 scopus 로고    scopus 로고
    • Detection of portscans using IP header data
    • Enschede, January 21
    • Haan, G.-H.K. (2005) Detection of Portscans Using IP Header Data. Proc. TBRC'05, Enschede, January 21.
    • (2005) Proc. TBRC'05
    • Haan, G.-H.K.1
  • 31
    • 3543096392 scopus 로고    scopus 로고
    • Fast portscan detection using sequential hypothesis testing
    • Oakland, CA, USA, May 9-12, IEEE Computer Society
    • Jung, J., Paxson, V., Berger, A.W. and Balakrishnan, H. (2004) Fast Portscan Detection Using Sequential Hypothesis Testing. Proc. SECPRI'04, Oakland, CA, USA, May 9-12, pp. 211-225. IEEE Computer Society.
    • (2004) Proc. SECPRI'04 , pp. 211-225
    • Jung, J.1    Paxson, V.2    Berger, A.W.3    Balakrishnan, H.4
  • 32
    • 85084164413 scopus 로고    scopus 로고
    • Bro:A system for detecting network intruders in real-time
    • San Antonio, TX, USA, January 26-29. USENIXAssociation
    • Paxson,V. (1998) Bro:ASystem for Detecting Network Intruders in Real-Time. Proc. USENIX Security Symp.'98, San Antonio, TX, USA, January 26-29, pp. 2435-2463. USENIXAssociation.
    • (1998) Proc. USENIX Security Symp. , vol.98 , pp. 2435-2463
    • Paxson, V.1
  • 33
    • 84941149577 scopus 로고    scopus 로고
    • The OSU flow-tools package and cisco netflow logs
    • New Orleans, LA, USA, December 3-8. USENIX Association
    • Fullmer,M. and Romig, S. (2000) The OSU Flow-Tools Package and Cisco Netflow Logs. Proc. LISA'00, New Orleans, LA, USA, December 3-8, pp. 291-303. USENIX Association.
    • (2000) Proc. LISA'00 , pp. 291-303
    • Fullmer, M.1    Romig, S.2
  • 34
    • 77951114448 scopus 로고    scopus 로고
    • A novel approach to scan detection on the backbone
    • Washington, DC, USA, April 27-29, IEEE Computer Society
    • Zhang, Y. and Fang, B. (2009) A Novel Approach to Scan Detection on the Backbone. Proc. ITNG'09, Washington, DC, USA, April 27-29, pp. 16-21. IEEE Computer Society.
    • (2009) Proc. ITNG'09 , pp. 16-21
    • Zhang, Y.1    Fang, B.2
  • 35
    • 33751053025 scopus 로고    scopus 로고
    • Connectionless port scan detection on the backbone
    • Phoenix, AZ, USA, April 10-12, IEEE Computer Society
    • Sridharan,A.,Ye,T. and Bhattacharyya, S. (2006) Connectionless Port Scan Detection on the Backbone. Proc. IPCCC'06, Phoenix, AZ, USA, April 10-12, pp. 567-576. IEEE Computer Society.
    • (2006) Proc. IPCCC'06 , pp. 567-576
    • Sridharan, A.1    Ye, T.2    Bhattacharyya, S.3
  • 36
    • 42549143607 scopus 로고    scopus 로고
    • Scalable double filter structure for port scan detection
    • Istanbul, Turkey, June 11-15, IEEE Computer Society
    • Kong, S., He, T., Shao, X., An, C. and Li, X. (2006) Scalable Double Filter Structure for Port Scan Detection. Proc. ICC'06, Istanbul, Turkey, June 11-15, pp. 2177-2182. IEEE Computer Society.
    • (2006) Proc. ICC'06 , pp. 2177-2182
    • Kong, S.1    He, T.2    Shao, X.3    An, C.4    Li, X.5
  • 37
    • 66649085194 scopus 로고    scopus 로고
    • Port scan detection
    • Habitat World, IHC, New Delhi, India, December 12-14, IEEE Computer Society
    • Gadge, J. and Patil, A.A. (2008) Port Scan Detection. Proc. ICON'08, Habitat World, IHC, New Delhi, India, December 12-14, pp. 1-6. IEEE Computer Society.
    • (2008) Proc. ICON'08 , pp. 1-6
    • Gadge, J.1    Patil, A.A.2
  • 38
    • 0028385414 scopus 로고
    • Fuzzy logic, neural networks, and soft computing
    • Zadeh, L.A. (1994) Fuzzy logic, neural networks, and soft computing. Commun. ACM, 37, 77-84.
    • (1994) Commun ACM , vol.37 , pp. 77-84
    • Zadeh, L.A.1
  • 39
    • 4544373082 scopus 로고    scopus 로고
    • Detecting low-profile probes and novel denialof- service attacks
    • West Point, NY, USA, June, IEEE Computer Society
    • Basu, R., Cunningham, R.K., Webster, S.E. and Lippmann, R.P. (2001) Detecting Low-profile Probes and Novel Denialof- Service Attacks. Proc. IWIAS'01,West Point, NY, USA, June, pp. 5-10. IEEE Computer Society.
    • (2001) Proc. IWIAS'01 , pp. 5-10
    • Basu, R.1    Cunningham, R.K.2    Webster, S.E.3    Lippmann, R.P.4
  • 41
    • 70449130709 scopus 로고    scopus 로고
    • A novel fast port scan method using partheno-genetic algorithm
    • Los Alamitos, CA, USA, August 8-11. IEEE Computer Society
    • Chen, J.J. and Cheng, X.J. (2009) A Novel Fast Port Scan Method Using Partheno-genetic Algorithm. Proc. ICCSIT'09, Los Alamitos, CA, USA, August 8-11, pp. 219-222. IEEE Computer Society.
    • (2009) Proc. ICCSIT'09 , pp. 219-222
    • Chen, J.J.1    Cheng, X.J.2
  • 42
    • 52949119607 scopus 로고    scopus 로고
    • On detecting port scanning using fuzzy based intrusion detection system
    • Crete Island, Greece, August 6-8, IEEE Computer Society
    • El-Hajj, W., Aloul, F., Trabelsi, Z. and Zaki, N. (2008) On Detecting Port Scanning Using Fuzzy Based Intrusion Detection System. Proc. IWCMC'08, Crete Island, Greece, August 6-8, pp. 105-110. IEEE Computer Society.
    • (2008) Proc. IWCMC'08 , pp. 105-110
    • El-Hajj, W.1    Aloul, F.2    Trabelsi, Z.3    Zaki, N.4
  • 43
    • 62949214093 scopus 로고    scopus 로고
    • Network traffic analysis using refined bayesian reasoning to detect flooding and port scan attacks
    • Phuket, Thailand, December 20-22, IEEE Computer Society
    • Liu, D., Zhang, M.W. and Li, T. (2008) Network Traffic Analysis Using Refined Bayesian Reasoning to Detect Flooding and Port Scan Attacks. Proc. ICACTE'08, Phuket, Thailand, December 20-22, pp. 1000-1004. IEEE Computer Society.
    • (2008) Proc. ICACTE'08 , pp. 1000-1004
    • Liu, D.1    Zhang, M.W.2    Li, T.3
  • 44
    • 47249157282 scopus 로고    scopus 로고
    • A comparative study of fuzzy inference systems, neural networks and adaptive neuro fuzzy inference systems for portscan detection
    • Naples, Italy, December, Springer
    • Shafiq, M.Z., Farooq, M. and Khayam, S.A. (2008) A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. Proc. EVO'08, Naples, Italy, December, pp. 52-61. Springer.
    • (2008) Proc. EVO'08 , pp. 52-61
    • Shafiq, M.Z.1    Farooq, M.2    Khayam, S.A.3
  • 46
    • 35648969617 scopus 로고    scopus 로고
    • A denial of service detector based on maximum likelihood detection and the random neural network
    • Oke, G. and Loukas, G. (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Comput. J., 50, 717-727.
    • (2007) Comput. J. , vol.50 , pp. 717-727
    • Oke, G.1    Loukas, G.2
  • 47
    • 70350179965 scopus 로고    scopus 로고
    • A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy
    • University of Washington, Seattle, USA, July 21-22, IEEE Computer Society
    • Kim, J. and Lee, J.H. (2008) A Slow Port Scan Attack Detection Mechanism Based on Fuzzy Logic and a Stepwise Policy. Proc. IET ICIE'08, University ofWashington, Seattle, USA, July 21-22, pp. 1-5. IEEE Computer Society.
    • (2008) Proc. IET ICIE'08 , pp. 1-5
    • Kim, J.1    Lee, J.H.2
  • 48
    • 20444438039 scopus 로고    scopus 로고
    • Passive visual fingerprinting of networkattack tools
    • ACMm, Washington, DC, USA, October
    • Conti, G. and Abdullah, K. (2004) Passive Visual Fingerprinting of NetworkAttackTools. Proc.VizSEC/DMSEC'04,Washington, DC, USA, October, 29, pp. 45-54. ACM.
    • (2004) Proc.VizSEC/DMSEC'04 , vol.29 , pp. 45-54
    • Conti, G.1    Abdullah, K.2
  • 49
    • 80053505465 scopus 로고    scopus 로고
    • Fyodor. Nmap.
    • Fyodor. Nmap. http://nmap.org/.
  • 50
    • 80053500232 scopus 로고    scopus 로고
    • Superscan
    • FoundStone, a division of McAfee. Superscan. http://www. foundstone.com/us/resources/proddesc/superscan.htm.
    • FoundStone, a division of McAfee
  • 51
    • 80053527612 scopus 로고    scopus 로고
    • Tenable Network Security Inc. Columbia. Nessus
    • Tenable Network Security Inc. Columbia. Nessus. http://www. nessus.org/nessus/.
  • 52
    • 20444484611 scopus 로고    scopus 로고
    • NVisionIP: Netflow visualizations of system state for security situational awareness
    • Washington, DC, USA, October 29, ACM
    • Lakkaraju, K., Yurcik, W. and Lee, A.J. (2004) NVisionIP: Netflow Visualizations of System State for Security Situational Awareness. Proc. VizSEC/DMSEC'04, Washington, DC, USA, October 29, pp. 65-72. ACM.
    • (2004) Proc. VizSEC/DMSEC'04 , pp. 65-72
    • Lakkaraju, K.1    Yurcik, W.2    Lee, A.J.3
  • 53
    • 33745653877 scopus 로고    scopus 로고
    • Interactive visualization for network and port scan detection
    • Seattle, WA, USA, September 7-9, Springer, Berlin
    • Muelder, C., Ma, K.-L. and Bartoletti, T. (2006) Interactive Visualization for Network and Port Scan Detection. LNCS, RAID'05, Seattle, WA, USA, September 7-9, pp. 265-283. Springer, Berlin.
    • (2006) LNCS, RAID'05 , pp. 265-283
    • Muelder, C.1    Ma, K.-L.2    Bartoletti, T.3
  • 54
    • 20444495766 scopus 로고    scopus 로고
    • PortVis:A tool for port-based detection of security events
    • Washington, DC, USA, October 29, ACM
    • McPherson, J., Ma, K.-L., Krystosk, P., Bartoletti, T. and Christensen, M. (2004) PortVis:A Tool for Port-Based Detection of Security Events. Proc. VizSEC/DMSEC'04,Washington, DC, USA, October 29, pp. 73-81. ACM.
    • (2004) Proc. VizSEC/DMSEC'04 , pp. 73-81
    • McPherson, J.1    Ma, K.-L.2    Krystosk, P.3    Bartoletti, T.4    Christensen, M.5
  • 55
    • 33745460819 scopus 로고    scopus 로고
    • Visualizing network data for intrusion detection
    • West Point, NY, USA, June. IEEE Computer Society
    • Abdullah, K., Lee, C., Conti, G. and Copeland, J.A. (2005) Visualizing Network Data for Intrusion Detection. Proc. IEEE IAW'05, West Point, NY, USA, June, pp. 100-108. IEEE Computer Society.
    • (2005) Proc IEEE IAW'05 , pp. 100-108
    • Abdullah, K.1    Lee, C.2    Conti, G.3    Copeland, J.A.4
  • 56
    • 35348837981 scopus 로고    scopus 로고
    • Visualising communication network security attacks
    • Washington, DC, USA, July 4-6, IEEE Computer Society
    • Musa, S. and Parish, D.J. (2007) Visualising Communication Network Security Attacks. Proc. IV'07, Washington, DC, USA, July 4-6, pp. 726-733. IEEE Computer Society.
    • (2007) Proc. IV'07 , pp. 726-733
    • Musa, S.1    Parish, D.J.2
  • 57
    • 33845483451 scopus 로고    scopus 로고
    • Searching for open windows and unlocked doors: Port scanning in large-scale commodity clusters
    • Cardiff, UK, May 9-12, IEEE Computer Society
    • Lee, A.J., Koenig, G.A., Meng, X. andYurcik,W. (2005) Searching for Open Windows and Unlocked Doors: Port Scanning in Large-Scale Commodity Clusters. Proc. CCGRID'05, Cardiff, UK, May 9-12, pp. 146-151. IEEE Computer Society.
    • (2005) Proc. CCGRID'05 , pp. 146-151
    • Lee, A.J.1    Koenig, G.A.2    Meng, X.3    Yurcik, W.4
  • 58
    • 20444445205 scopus 로고    scopus 로고
    • NVisionCC: A visualization framework for high performance cluster security
    • New York, NY, USA, October 29, ACM
    • Yurcik, W., Meng, X. and Kiyanclar, N. (2004) NVisionCC: A Visualization Framework for High Performance Cluster Security. Proc. VizSEC/DMSEC'04, New York, NY, USA, October 29, pp. 133-137. ACM.
    • (2004) Proc. VizSEC/DMSEC'04 , pp. 133-137
    • Yurcik, W.1    Meng, X.2    Kiyanclar, N.3
  • 59
    • 60349087613 scopus 로고    scopus 로고
    • A novel visualization approach for efficient network scans detection
    • Horizon Resort, Sanya, Hainan Island, China, December 13-15, IEEE Computer Society
    • Jiawan, Z., Liang, L., Liangfu, L. and Ning, Z. (2008) A Novel Visualization Approach for Efficient Network Scans Detection. Proc. SECTECH'08, Horizon Resort, Sanya, Hainan Island, China, December 13-15, pp. 23-26. IEEE Computer Society.
    • (2008) Proc. SECTECH'08 , pp. 23-26
    • Jiawan, Z.1    Liang, L.2    Liangfu, L.3    Ning, Z.4
  • 61
    • 0345477912 scopus 로고    scopus 로고
    • A methodology for using intelligent agents to provide automated intrusion response
    • United States MilitaryAcademy,West Point, NY, USA, June 6-7. IEEE Computer Society
    • Curtis, A.C.J., John, M.D.H., John, R.S. and Udo,W.P. (2000)A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response. Proc. IEEE SMC IAW'00, United States MilitaryAcademy,West Point, NY, USA, June 6-7, pp. 110-116. IEEE Computer Society.
    • (2000) Proc IEEE SMC IAW'00 , pp. 110-116
    • Curtis, A.C.J.1    John, M.D.H.2    John, R.S.3    Udo, W.P.4
  • 62
    • 51049100612 scopus 로고    scopus 로고
    • Scan attack detection based on distributed cooperative model
    • Xi'an, China,April 16-18. IEEE Computer Society
    • Zhang, W., Teng, S. and Fu, X. (2008) Scan Attack Detection Based on Distributed Cooperative Model. Proc. CSCWD'08, Xi'an, China,April 16-18, pp. 743-748. IEEE Computer Society.
    • (2008) Proc. CSCWD'08 , pp. 743-748
    • Zhang, W.1    Teng, S.2    Fu, X.3
  • 63
    • 33846199593 scopus 로고    scopus 로고
    • A self-aware approach to denial of service defence
    • Gelenbe, E. and Loukas, G. (2007) A self-aware approach to denial of service defence. Comput. Netw., 51, 1299-1314.
    • (2007) Comput. Netw. , vol.51 , pp. 1299-1314
    • Gelenbe, E.1    Loukas, G.2
  • 64
    • 50249125438 scopus 로고    scopus 로고
    • Detecting denial of service attacks with bayesian classifiers and the random neural network
    • London, UK, July, IEEE, USA
    • Oke, G., Loukas, G. and Gelenbe, E. (2007) Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network. Proc. FUZZ-IEEE'07, London, UK, July, pp. 1964-1969. IEEE, USA.
    • (2007) Proc. FUZZ-IEEE'07 , pp. 1964-1969
    • Oke, G.1    Loukas, G.2    Gelenbe, E.3
  • 65
    • 84870227311 scopus 로고    scopus 로고
    • Likelihood ratios and recurrent random neural networks in detection of denial of service attacks
    • San Diego, CA, USA, July
    • Loukas, G. and Oke, G. (2007) Likelihood Ratios and Recurrent Random Neural Networks in Detection of Denial of Service Attacks. Proc. SPECTS'07, San Diego, CA, USA, July 16-18.
    • (2007) Proc. SPECTS'07 , pp. 16-18
    • Loukas, G.1    Oke, G.2
  • 66
    • 0001373628 scopus 로고
    • Random neural networks with negative and positive signals and product form solution
    • Gelenbe, E. (1989) Random neural networks with negative and positive signals and product form solution. Neural Comput., 1, 502-510.
    • (1989) Neural Comput. , vol.1 , pp. 502-510
    • Gelenbe, E.1
  • 67
    • 21344486418 scopus 로고
    • G-networks:A unifying model for neural and queueing networks
    • Gelenbe, E. (1994) G-networks:A unifying model for neural and queueing networks. Ann. Oper. Res., 48, 433-461.
    • (1994) Ann. Oper. Res. , vol.48 , pp. 433-461
    • Gelenbe, E.1
  • 68
    • 55449106994 scopus 로고    scopus 로고
    • Synchronized interactions in spiked neuronal networks
    • Gelenbe, E. and Timotheou, S. (2008) Synchronized interactions in spiked neuronal networks. Comput. J., 51, 723-730.
    • (2008) Comput. J. , vol.51 , pp. 723-730
    • Gelenbe, E.1    Timotheou, S.2
  • 70
    • 84878700321 scopus 로고    scopus 로고
    • A first look at modern enterprise traffic
    • Berkeley, CA, USA, October 19-21. USENIX Association
    • Pang, R.,Allman, M., Bennett, M., Lee, J., Paxson,V. andTierney, B. (2005)A First Look at Modern Enterprise Traffic. Proc. ACM IMC'05, Berkeley, CA, USA, October, 19-21, pp. 2-2. USENIX Association.
    • (2005) Proc. ACM IMC'05 , pp. 2-2
    • Pang R.Allman, M.1    Bennett, M.2    Lee, J.3    Paxson, V.4    Tierney, B.5
  • 71
  • 72
    • 80053484031 scopus 로고    scopus 로고
    • symantec.com. Symantec security response
    • symantec.com. Symantec security response. http://security response.symantec.com/avcenter.
  • 73
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S. (2000) The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur., 3, 186-205.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , pp. 186-205
    • Axelsson, S.1
  • 74
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • McHugh, J. (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3, 262-294.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , pp. 262-294
    • McHugh, J.1
  • 75
    • 56549083676 scopus 로고    scopus 로고
    • A comparative evaluation of anomaly detectors under portscan attacks
    • Cambridge, MA, USA, September 15-17, Springer, Berlin
    • Ashfaq, A.B., Robert, M.J., Mumtaz, A., Ali, M.Q., Sajjad, A. and Khayam, S.A. (2008) A Comparative Evaluation of Anomaly Detectors Under Portscan Attacks. Proc. RAID'08, Cambridge, MA, USA, September 15-17, pp. 351-371. Springer, Berlin.
    • (2008) Proc. RAID'08 , pp. 351-371
    • Ashfaq, A.B.1    Robert, M.J.2    Mumtaz, A.3    Ali, M.Q.4    Sajjad, A.5    Khayam, S.A.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.