메뉴 건너뛰기




Volumn 19, Issue 5, 2011, Pages 1396-1404

A network activity classification schema and its application to scan detection

Author keywords

Security and protection; system management; traffic analysis

Indexed keywords

DATA SETS; DETECTION METHODS; DETECTION TECHNIQUE; INTERNET TRAFFIC; IP ADDRESSS; MALICIOUS ACTIVITIES; NETWORK ACTIVITIES; PRIORITIZATION; PROOF OF CONCEPT; SECURITY AND PROTECTION; SECURITY APPLIANCES; SYSTEM MANAGEMENT; TRAFFIC ANALYSIS;

EID: 80054118821     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2011.2109009     Document Type: Article
Times cited : (32)

References (35)
  • 2
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems:Acritique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • J. McHugh, "Testing intrusion detection systems:Acritique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," Trans. Inf. Syst. Security, vol. 10, no. 4, pp. 262-294, 2000.
    • (2000) Trans. Inf. Syst. Security , vol.10 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 5
    • 33646179175 scopus 로고    scopus 로고
    • Internet intrusions: Global characteristics and prevalence
    • V. Yegneswaran, P. Barford, and J. Ulrich, "Internet intrusions: Global characteristics and prevalence," in Proc. ACMSIGMETRICS, 2003, pp. 138-147.
    • (2003) Proc. ACMSIGMETRICS , pp. 138-147
    • Yegneswaran, V.1    Barford, P.2    Ulrich, J.3
  • 6
    • 84942250809 scopus 로고    scopus 로고
    • Surveillance detection in high bandwidth environments
    • Washington, DC, Apr.
    • S. Robertson, E. Siegel, M. Miller, and S. Stolfo, "Surveillance detection in high bandwidth environments," in Proc. 3rd IEEE DISCEX, Washington, DC, Apr. 2003, vol. 1, pp. 130-138.
    • (2003) Proc. 3rd IEEE DISCEX , vol.1 , pp. 130-138
    • Robertson, S.1    Siegel, E.2    Miller, M.3    Stolfo, S.4
  • 7
    • 42149134786 scopus 로고    scopus 로고
    • A brief history of scanning
    • San Diego, CA, Oct.
    • M. Allman, V. Paxson, and J. Terrell, "A brief history of scanning," in Proc. ACM SIGCOMM IMC, San Diego, CA, Oct. 2007, pp. 77-82.
    • (2007) Proc. ACM SIGCOMM IMC , pp. 77-82
    • Allman, M.1    Paxson, V.2    Terrell, J.3
  • 9
    • 0742283589 scopus 로고    scopus 로고
    • Sourcefire, Inc., Columbia, MD [Online]
    • M. Roesch, "Snort," Sourcefire, Inc., Columbia, MD, 2003 [Online]. Available: http://www.snort.org
    • (2003) Snort
    • Roesch, M.1
  • 10
    • 80054102323 scopus 로고    scopus 로고
    • Sourcefire, Inc., Columbia, MD [Online]
    • "Snort Users Manual" Sourcefire, Inc., Columbia, MD, 2009 [Online]. Available: http://cvs.snort.org/viewcvs. cgi/*checkout*/ snort/doc/snort-manual.pdf?rev=1.72.2. 1&only-with-tag=SNORT-2-8- 0&content-type=application/pdf
    • (2009) Snort Users Manual
  • 11
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • S. Staniford, J. Hoagland, and J. McAlerney, "Practical automated detection of stealthy portscans," J. Comput. Security vol. 10, no. 1/2, pp. 105-136, 2002. (Pubitemid 34531414)
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 105-136
    • Staniford, S.1    Hoagland, J.A.2    McAlerney, J.M.3
  • 13
    • 3543096392 scopus 로고    scopus 로고
    • Fast portscan detection using sequential hypothesis testing
    • J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proc. IEEE S&P, 2004, pp. 211-225.
    • (2004) Proc. IEEE S&P , pp. 211-225
    • Jung, J.1    Paxson, V.2    Berger, A.W.3    Balakrishnan, H.4
  • 14
  • 18
    • 77958030888 scopus 로고    scopus 로고
    • Improved detection of low-profile probe and novel denial-of-service attacks
    • Baltimore, MD, Jun. [Online]
    • W. Streilein, R. Cunningham, and S. Webster, "Improved detection of low-profile probe and novel denial-of-service attacks," in Proc. Workshop Statist. Mach. Learn. Tech. Comput. Intrusion Detect., Baltimore, MD, Jun. 2002 [Online]. Available: http://ams.jhu.edu/~cidwkshop/Presentations2002/Streilein- Paper.pdf
    • (2002) Proc. Workshop Statist. Mach. Learn. Tech. Comput. Intrusion Detect.
    • Streilein, W.1    Cunningham, R.2    Webster, S.3
  • 20
    • 85008008496 scopus 로고    scopus 로고
    • Internet traffic behavior profiling for network security monitoring
    • Dec.
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Internet traffic behavior profiling for network security monitoring," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1241-1252, Dec. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.6 , pp. 1241-1252
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 23
    • 84906784342 scopus 로고    scopus 로고
    • Detecting low-profile scans in tcp anomaly event data
    • New York
    • J. Treurniet, "Detecting low-profile scans in tcp anomaly event data," in Proc. ACM PST, New York, 2006, pp. 1-8.
    • (2006) Proc. ACM PST , pp. 1-8
    • Treurniet, J.1
  • 25
    • 0003260781 scopus 로고
    • Transmission control protocol
    • Sep. [Online]
    • J. Postel, "Transmission Control Protocol," RFC 793, Sep. 1981 [Online]. Available: http://www.ietf.org/rfc/rfc793.txt
    • (1981) RFC , vol.793
    • Postel, J.1
  • 26
    • 0003355302 scopus 로고
    • User datagram protocol
    • Aug. [Online]
    • J. Postel, "User Datagram Protocol," RFC 768, Aug. 1980 [Online]. Available: http://www.ietf.org/rfc/rfc768.txt
    • (1980) RFC , vol.768
    • Postel, J.1
  • 27
    • 0003232377 scopus 로고
    • Internet control message protocol
    • Sep. [Online]
    • J. Postel, "Internet Control Message Protocol," RFC 792, Sep. 1981 [Online]. Available: http://www.ietf.org/rfc/rfc792.txt
    • (1981) RFC , vol.792
    • Postel, J.1
  • 30
    • 80054123001 scopus 로고    scopus 로고
    • Apostols, West Lafayette, IN [Online]
    • "Queso," Apostols, West Lafayette, IN, 1998 [Online]. Available: http://ftp.cerias.purdue.edu/pub/tools/unix/scanners/queso
    • (1998) Queso
  • 32
    • 0003208908 scopus 로고
    • File transfer protocol
    • Oct. [Online]
    • J. Postel and J. Reynolds, "File Transfer Protocol," RFC 959, Oct. 1985 [Online]. Available: http://www.ietf.org/rfc/rfc959.txt
    • (1985) RFC , vol.959
    • Postel, J.1    Reynolds, J.2
  • 33
    • 35048862795 scopus 로고    scopus 로고
    • Performance measurement and analysis of h.323 traffic
    • Antibes Juan-les-Pins, France, Apr.
    • P. Calyam, M. Sridharan, W. Mandrawa, and P. Schopis, "Performance measurement and analysis of h.323 traffic," in Proc. PAM, Antibes Juan-les-Pins, France, Apr. 2004, pp. 137-146.
    • (2004) Proc. PAM , pp. 137-146
    • Calyam, P.1    Sridharan, M.2    Mandrawa, W.3    Schopis, P.4
  • 35


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.