메뉴 건너뛰기




Volumn 6, Issue 1, 2008, Pages 60-66

Baseline profile stability for network anomaly detection

Author keywords

Denial of service attack; Internet traffic profile; Network security

Indexed keywords

ANOMALY-BASED IDS; BASELINE PROFILES; DEFENSE MECHANISM; DENIAL OF SERVICE ATTACKS; INTERNET TRAFFIC; NETWORK ANOMALY DETECTION; NORMAL OPERATIONS; SIGNIFICANT DIFFERENCES;

EID: 84874993569     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (19)
  • 1
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant behavior detection in Time Series for Network Monitoring
    • Dec.
    • J. D. Brutlag, "Aberrant behavior detection in Time Series for Network Monitoring," in the 14th USENIX Conference, pp. 139-146, Dec. 2000.
    • (2000) The 14th USENIX Conference , pp. 139-146
    • Brutlag, J.D.1
  • 2
    • 84874954399 scopus 로고    scopus 로고
    • Captus Networks.
    • Captus Networks. (http://www.captusnetworks.com)
  • 3
    • 84874957801 scopus 로고    scopus 로고
    • DeepNines Technologies
    • DeepNines Technologies. (http://www.deepnines.com)
  • 4
    • 1242310086 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption innetwork traffic
    • C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption innetwork traffic," in Proceedings of 2003 ACM SIGCOMM, pp 137-148, 2003.
    • (2003) Proceedings of 2003 ACM SIGCOMM , pp. 137-148
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 6
    • 4143081502 scopus 로고    scopus 로고
    • A Covariance analysis model for DDoS attack detection
    • S. Jin, and D. S. Yeung, "A Covariance analysis model for DDoS attack detection," in Proceedings of 2004 IEEE ICC, pp. 1882-1886, 2004.
    • (2004) Proceedings of 2004 IEEE ICC , pp. 1882-1886
    • Jin, S.1    Yeung, D.S.2
  • 8
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: statistics-based overload control against distributed denial-of-service attacks
    • Mar
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "PacketScore: statistics-based overload control against distributed denial-of-service attacks," in Proceedings of IEEE INFOCOM, pp. 2594-2604, Mar. 2004.
    • (2004) Proceedings of IEEE INFOCOM , pp. 2594-2604
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 9
    • 6344258028 scopus 로고    scopus 로고
    • Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters
    • June
    • J. Li, and C. Manikopoulos, "Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters," in Proceedings of 2003 IEEE Workshop on Information Assurance, pp. 53-59, June 2003.
    • (2003) Proceedings of 2003 IEEE Workshop on Information Assurance , pp. 53-59
    • Li, J.1    Manikopoulos, C.2
  • 10
    • 25844492549 scopus 로고    scopus 로고
    • On the ef- fectiveness of DDoS attacks on statistical filtering
    • Q. Li, E. C. Chang, and M. C. Chan, "On the ef- fectiveness of DDoS attacks on statistical filtering," in Proceedings of IEEE INFOCOM, pp. 1373-1383, 2005.
    • (2005) Proceedings of IEEE INFOCOM , pp. 1373-1383
    • Li, Q.1    Chang, E.C.2    Chan, M.C.3
  • 12
    • 0242456801 scopus 로고    scopus 로고
    • Learning nonstationary models of normal network traffic for detecting novel attacks
    • M. Mahoney and P. K. Chan, "Learning nonstationary models of normal network traffic for detecting novel attacks," in Proceedings of ACM 2002 SIGKDD, pp 376-385, 2002.
    • (2002) Proceedings of ACM 2002 SIGKDD , pp. 376-385
    • Mahoney, M.1    Chan, P.K.2
  • 18
    • 84874961518 scopus 로고    scopus 로고
    • Top Layer Networks.
    • Top Layer Networks. (http://www.toplayer.com)
  • 19
    • 84874969314 scopus 로고    scopus 로고
    • Vsecure Technologies
    • Vsecure Technologies. (http://www.v-secure.com)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.