메뉴 건너뛰기




Volumn 6961 LNCS, Issue , 2011, Pages 161-180

Revisiting traffic anomaly detection using software defined networking

Author keywords

Anomaly detection; Network Security; Openflow; Programmable Networks; Software Defined Networking

Indexed keywords

ANOMALY DETECTION; ANOMALY DETECTOR; EFFICIENCY ANALYSIS; EXPONENTIAL GROWTH; HOME NETWORKS; HOME OFFICE; HOME USERS; LINE RATE; MALICIOUS ACTIVITIES; NETWORK SECURITY PROBLEMS; OPENFLOW; PERFORMANCE PENALTIES; PROGRAMMABLE NETWORK; SMALL OFFICE/HOME OFFICES; TRAFFIC ANOMALIES;

EID: 84857255431     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23644-0_9     Document Type: Conference Paper
Times cited : (284)

References (33)
  • 5
    • 84857265298 scopus 로고    scopus 로고
    • Nox box, http://noxrepo.org/manual/noxbox.html
    • Nox Box
  • 6
    • 84872241240 scopus 로고    scopus 로고
    • Open vswitch, http://openvswitch.org/
    • Open Vswitch
  • 10
    • 58049132069 scopus 로고    scopus 로고
    • Voyage linux, http://linux.voyage.hk/
    • Voyage Linux
  • 11
    • 79959464543 scopus 로고    scopus 로고
    • Anti-phishingworking group. 4th quarter / 2009
    • Anti-phishingworking group. phishing activity trends report, 4th quarter / 2009 (2010), http://www.antiphishing.org/reports/apwg-report-Q4-2009.pdf
    • (2010) Phishing Activity Trends Report
  • 12
    • 56549083676 scopus 로고    scopus 로고
    • A comparative evaluation of anomaly detectors under portscan attacks
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Ashfaq, A.B., Robert, M.J., Mumtaz, A., Ali, M.Q., Sajjad, A., Khayam, S.A.: A comparative evaluation of anomaly detectors under portscan attacks. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 351-371. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 351-371
    • Ashfaq, A.B.1    Robert, M.J.2    Mumtaz, A.3    Ali, M.Q.4    Sajjad, A.5    Khayam, S.A.6
  • 25
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM SIGCOMM. pp. 217-228 (2005)
    • (2005) ACM SIGCOMM , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 26
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. Springer, Heidelberg
    • Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 346-350. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3006 , pp. 346-350
    • Mahoney, M.V.1
  • 31
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. In: ACSAC (2002)
    • (2002) ACSAC
    • Williamson, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.