메뉴 건너뛰기




Volumn 11, Issue 9, 2012, Pages 1243-1250

Hierarchical method for anomaly detection and attack identification in high-speed network

Author keywords

Anomaly detection; Consensus combination; Denial of service; Exponentially Weighted Moving Average; Hierarchical method; High speed network

Indexed keywords

ANOMALY DETECTION; CONSENSUS COMBINATION; DENIAL OF SERVICE; EXPONENTIALLY WEIGHTED MOVING AVERAGE; HIERARCHICAL METHOD; HIGH-SPEED;

EID: 84863186562     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2012.1243.1250     Document Type: Article
Times cited : (3)

References (15)
  • 2
    • 42449088159 scopus 로고    scopus 로고
    • Intrusion detection in computer systems using multiple classifier systems
    • Corona, I., G. Giacinto and F. Roll, 2008. Intrusion detection in computer systems using multiple classifier systems. Stud. Comput. Intelhg., 126:91-113.
    • (2008) Stud. Comput. Intelhg. , vol.126 , pp. 91-113
    • Corona, I.1    Giacinto, G.2    Roll, F.3
  • 3
    • 77952411826 scopus 로고    scopus 로고
    • Passively monitoring networks at gigabit speeds using commodity hardware and open source software
    • October 2003, Miami FL.
    • Deri, L., 2003. Passively monitoring networks at gigabit speeds using commodity hardware and open source software. Proceedings of the Passive and Active Measurement Conference, October 2003, Miami FL., pp:1-7.
    • (2003) Proceedings of the Passive and Active Measurement Conference , pp. 1-7
    • Deri, L.1
  • 7
    • 34548183355 scopus 로고    scopus 로고
    • A distributed approach using entropy to detect DDoS attacks in ISP domain
    • DOI 10.1109/ICSCN.2007.350758, 4156640, Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking
    • Kumar, K., R. C. Joshil and K. Singh, 2007. A distributed approach using entropy to detect DDoS attacks in ISP domain. Proceedings of the IEEE International Conference on Signal Processing, Communications and Networking, February 22-24, 2007, Chennai, India, pp:331-337. (Pubitemid 47304132)
    • (2007) Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking , pp. 331-337
    • Kumar, K.1    Joshi, R.C.2    Singh, K.3
  • 8
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • DOI 10.1145/1090191.1080118
    • Lakhina, A., M. Crovella and C. Diot, 2005. Mining anomalies using traffic feature distributions. ACM Sigcomm Comput. Commnn. Rev., 35:217-228. (Pubitemid 46323506)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 12
    • 70349664554 scopus 로고    scopus 로고
    • Using renyi cross entropy to analyze traffic matrix and detect DDoS attacks
    • Yan, R. and Q. Zheng, 2009. Using renyi cross entropy to analyze traffic matrix and detect DDoS attacks. Inform. Technol. J., 8:1180-1188.
    • (2009) Inform. Technol. J. , vol.8 , pp. 1180-1188
    • Yan, R.1    Zheng, Q.2
  • 13
    • 84863136363 scopus 로고    scopus 로고
    • Hurst parameter for security evaluation of LAN traffic
    • Yan, R. and Y. Wang, 2012. Hurst parameter for security evaluation of LAN traffic. Inform. Technol. J., 11:269-275.
    • (2012) Inform. Technol. J. , vol.11 , pp. 269-275
    • Yan, R.1    Wang, Y.2
  • 14
    • 77954255664 scopus 로고    scopus 로고
    • Combining adaptive filtering and IF flows to detect DDoS attacks within a router
    • Yan, R., Q. Zheng and H. Li, 2010. Combining adaptive filtering and IF flows to detect DDoS attacks within a router. KSII Trans. Internet Inf. Syst, 4:428-451.
    • (2010) KSII Trans. Internet Inf. Syst , vol.4 , pp. 428-451
    • Yan, R.1    Zheng, Q.2    Li, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.