메뉴 건너뛰기




Volumn 25, Issue 5, 2012, Pages 672-688

Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions

Author keywords

allied DIPS; conditional legitimate probability; firewall; IDS; IPS

Indexed keywords

ACTIVITY PROBLEM; ALLIED DIPS; ANOMALY DETECTION; DETECTION ACCURACY; DISTRIBUTED DENIAL OF SERVICE ATTACK; DISTRIBUTED NETWORKS; FALSE NEGATIVES; FALSE POSITIVE; FIREWALL; IDS; INTERNET SECURITY; INTRUSION PREVENTION SYSTEMS; INTRUSION SIGNATURES; IPS; MISUSE DETECTION; NETWORK INTRUSION DETECTION SYSTEMS; NETWORK TRAFFIC; REAL NETWORKS;

EID: 84860700540     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1289     Document Type: Article
Times cited : (16)

References (38)
  • 2
    • 50249148284 scopus 로고    scopus 로고
    • Localized and load-balanced clustering for energy saving in wireless sensor networks
    • Su BL, Wang MS, Huang YM,. Localized and load-balanced clustering for energy saving in wireless sensor networks. International Journal of Communication Systems 2008; 21 8: 799-814.
    • (2008) International Journal of Communication Systems , vol.21 , Issue.8 , pp. 799-814
    • Su, B.L.1    Wang, M.S.2    Huang, Y.M.3
  • 3
    • 67349219359 scopus 로고    scopus 로고
    • Pervasive, Secure Access to a Hierarchical-based Healthcare Monitoring Architecture in Wireless Heterogeneous Sensor Networks
    • Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH,. Pervasive, Secure Access to a Hierarchical-based Healthcare Monitoring Architecture in Wireless Heterogeneous Sensor Networks. IEEE Journal on Selected Areas in Communications 2009; 27 4: 400-411.
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4 , pp. 400-411
    • Huang, Y.M.1    Hsieh, M.Y.2    Chao, H.C.3    Hung, S.H.4    Park, J.H.5
  • 4
    • 84858613793 scopus 로고    scopus 로고
    • Firewall (computing). [Apr. 2008]
    • Wikipedia. Firewall (computing). Available from: [Apr. 2008].
    • Wikipedia
  • 5
    • 84870638842 scopus 로고    scopus 로고
    • The FreeBSD Documentation Project [June 2009]
    • The FreeBSD Documentation Project. FreeBSD Handbook. Available from: [June 2009].
    • FreeBSD Handbook
  • 10
    • 27644509266 scopus 로고    scopus 로고
    • Intrusion detection systems and intrusion prevention systems
    • DOI 10.1016/j.istr.2005.08.001, PII S1363412705000415
    • Fuchsberger A,. Intrusion detection systems and intrusion prevention systems. Information Security Technical Report 2005; 10 3: 134-139. (Pubitemid 41550372)
    • (2005) Information Security Technical Report , vol.10 , Issue.3 , pp. 134-139
    • Fuchsberger, A.1
  • 12
    • 78049324449 scopus 로고    scopus 로고
    • Correlation analysis of intrusion alerts
    • In, Pietro R. Mancini L. (eds), Springer, Berlin, (;. ISBN 978-0-387-77265-3
    • Xu D, Ning P,. Correlation analysis of intrusion alerts, In Intrusion Detection Systems, (Vol. 38 of Advances in Information Security), Pietro R, Mancini L, (eds), Springer, Berlin, (2008; 65-92. ISBN 978-0-387-77265-3
    • (2008) Intrusion Detection Systems, (Vol. 38 of Advances in Information Security) , pp. 65-92
    • Xu, D.1    Ning, P.2
  • 13
    • 84860670029 scopus 로고    scopus 로고
    • Toward automated intrusion alert analysis
    • In, Huang S. Du D. MacCallum D. (eds), Springer, Berlin, ISBN 978-0-387-73820-8
    • Ning P, Xu D,. Toward automated intrusion alert analysis, In Network Security, Huang S, Du D, MacCallum D, (eds), Springer, Berlin, 2010. ISBN 978-0-387-73820-8
    • (2010) Network Security
    • Ning, P.1    Xu, D.2
  • 15
    • 67349242974 scopus 로고    scopus 로고
    • A logic-based model to support alert correlation in intrusion detection
    • Morin B, Mé L, Debar H, Ducassé M,. A logic-based model to support alert correlation in intrusion detection. Information Fusion 2009; 10 4: 285-299.
    • (2009) Information Fusion , vol.10 , Issue.4 , pp. 285-299
    • Morin, B.1    Mé, L.2    Debar, H.3    Ducassé, M.4
  • 16
    • 67349164787 scopus 로고    scopus 로고
    • Processing intrusion detection alert aggregates with time series modeling
    • Viinikka J, Debar H, Me L, Lehikoinen A, Tarvainen M,. Processing intrusion detection alert aggregates with time series modeling. Information Fusion 2009; 10 4: 312-324.
    • (2009) Information Fusion , vol.10 , Issue.4 , pp. 312-324
    • Viinikka, J.1    Debar, H.2    Me, L.3    Lehikoinen, A.4    Tarvainen, M.5
  • 17
    • 50049118707 scopus 로고    scopus 로고
    • A flexible approach to intrusion alert anonymization and correlation
    • 28 August-1 September
    • Xu D, Ning P,. A flexible approach to intrusion alert anonymization and correlation, Securecomm and Workshops,28 August-1 September 2006; 1-10.
    • (2006) Securecomm and Workshops , pp. 1-10
    • Xu, D.1    Ning, P.2
  • 20
    • 33845524232 scopus 로고    scopus 로고
    • Network intrusion detection: Automated and manual methods prone to attack and evasion
    • Chaboya D, Raines R, Baldwin R, Mullins B,. Network intrusion detection: automated and manual methods prone to attack and evasion. Journal of IEEE Security & Privacy 2006; 8 6: 36-43. (Pubitemid 44925870)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.6 , pp. 36-43
    • Chaboya, D.J.1    Raines, R.A.2    Baldwin, R.O.3    Mullins, B.E.4
  • 22
    • 68249135445 scopus 로고    scopus 로고
    • Enhanced high performance distributed coordination function for IEEE 802.11 multi-rate LANs
    • Ke CH, Li B, Huang YM, Chang JM,. Enhanced high performance distributed coordination function for IEEE 802.11 multi-rate LANs. International Journal of Communication Systems 2008; 22 8: 1045-1061.
    • (2008) International Journal of Communication Systems , vol.22 , Issue.8 , pp. 1045-1061
    • Ke, C.H.1    Li, B.2    Huang, Y.M.3    Chang, J.M.4
  • 24
    • 84860652783 scopus 로고    scopus 로고
    • The FreeBSD Foundation [Sep. 2008]
    • The FreeBSD Foundation. FreeBSD The Power to Serve. Available from: [Sep. 2008].
    • FreeBSD the Power to Serve
  • 27
    • 8344261545 scopus 로고    scopus 로고
    • Packetscore: Statistics-based overload control against distributed denial-of-service attacks
    • Kim Y, Lau WC, Chuah MC, Chao HJ,. Packetscore: statistics-based overload control against distributed denial-of-service attacks. INFOCOM 2004; 4: 2594-2604.
    • (2004) INFOCOM , vol.4 , pp. 2594-2604
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 28
    • 74049157937 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory [Sep. 2008]
    • MIT Lincoln Laboratory. Information Systems Technology. Available from: [Sep. 2008].
    • Information Systems Technology
  • 30
    • 77955377238 scopus 로고    scopus 로고
    • The Wireshark team [Jan. 2009]
    • The Wireshark team. Wireshark User's Guide. Available from: http://www.wireshark.org/docs/[Jan. 2009].
    • Wireshark User's Guide
  • 31
    • 84860652251 scopus 로고    scopus 로고
    • [Jan. 2009]
    • Gordon Lyon,. Nmap. Available from: http://nmap.org/docs.html[Jan. 2009].
    • Gordon, L.1
  • 32
    • 84860652250 scopus 로고    scopus 로고
    • XFOCUS Team tfn2k.gz [Dec. 2008]
    • XFOCUS Team. tfn2k.gz. Available from: http://www.xfocus.net/tools/ 200405/697.html[Dec. 2008].
  • 33
    • 84860652252 scopus 로고    scopus 로고
    • Mixter [Dec. 2008]
    • Mixter. tfn2k use and countermeasures. Available from: http://fanqiang.chinaunix.net/a5/b6/20010419/130342-b.html[Dec. 2008].
    • Tfn2k Use and Countermeasures
  • 34
    • 84860694878 scopus 로고    scopus 로고
    • Mixter [Dec. 2008]
    • Mixter. Tribe Flood Network. Available from: http://en.wikipedia.org/ wiki/tribe-flood-network[Dec. 2008].
    • Tribe Flood Network
  • 35
    • 43249105264 scopus 로고    scopus 로고
    • An assessment of the DARPA IDS Evaluation Dataset Using Snort
    • University of California Davis, Davis, CA, (6 January)
    • Brugger ST, Chow J,. An assessment of the DARPA IDS Evaluation Dataset Using Snort, Technical Report CSE-2007-1, University of California Davis, Davis, CA, (6 January 2007).
    • (2007) Technical Report CSE-2007-1
    • Brugger, S.T.1    Chow, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.