메뉴 건너뛰기




Volumn , Issue , 2005, Pages 239-252

Data reduction for the scalable automated analysis of distributed darknet traffic

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK BEHAVIOR; AUTOMATED ANALYSIS; GLOBAL BEHAVIORS; HONEYPOTS; INTERNET INFRASTRUCTURE; NUMBER OF SOURCES; PRODUCTION NETWORK; RANDOM SCANNING;

EID: 84878677794     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (35)

References (41)
  • 5
    • 0009016272 scopus 로고
    • An evening with berferd in which a cracker is lured, endured, and studied
    • January 20 - January 24, 1992 San Francisco, California Berkeley, CA, USA, Winter
    • Bill Cheswick. An evening with Berferd in which a cracker is lured, endured, and studied. In Proceedings of the Winter 1992 USENIX Conference: January 20 - January 24, 1992, San Francisco, California, pages 163-174, Berkeley, CA, USA, Winter 1992.
    • (1992) Proceedings of the Winter 1992 USENIX Conference , pp. 163-174
    • Cheswick, B.1
  • 8
    • 84861803524 scopus 로고    scopus 로고
    • June
    • Team CYMRU. The darknet project. http://www.cymru.com/Darknet/index.html, June 2004.
    • (2004) The Darknet Project
  • 12
    • 0035153870 scopus 로고    scopus 로고
    • A statistical approach to predictive detection
    • Amsterdam, Netherlands January
    • Joseph L. Hellerstein, Fan Zhang, and Shahabuddin Shahabuddin. A statistical approach to predictive detection. Computer Networks (Amsterdam, Netherlands: 1999), 35(1):77-95, January 2001.
    • (1999) Computer Networks , vol.35 , Issue.1 , pp. 77-95
    • Hellerstein, J.L.1    Fan, Z.2    Shahabuddin, S.3
  • 13
    • 0005018009 scopus 로고    scopus 로고
    • Cisco Systems Inc. Netflow services and applications. http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/nappswp.htm, 2002.
    • (2002) Netflow Services and Applications
  • 14
    • 0343822522 scopus 로고    scopus 로고
    • Adaptive thresholding for proactive network problem detection
    • Newport, Rhode Island, April
    • Chuanyi Ji and Marina Thottan. Adaptive thresholding for proactive network problem detection. In Third IEEE International Workshop on Systems Management, pages 108-116, Newport, Rhode Island, April 1998.
    • (1998) Third IEEE International Workshop on Systems Management , pp. 108-116
    • Ji, C.1    Thottan, M.2
  • 15
    • 85084164812 scopus 로고    scopus 로고
    • Collapsar: A VM-based architecture for network attack detention center
    • San Diego, CA, USA, August
    • Xuxian Jiang and Dongyan Xu. Collapsar: A VM-based architecture for network attack detention center. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, August 2004.
    • (2004) Proceedings of the 13th USENIX Security Symposium
    • Jiang, X.1    Xu, D.2
  • 19
    • 84878732637 scopus 로고    scopus 로고
    • January
    • Robert Lemos. MySQL worm halted. http://ecoustics-cnet.com.com/ MySQL+worm+halted/2100-73493-5555242.html, January 2005.
    • (2005) MySQL Worm Halted
    • Lemos, R.1
  • 20
    • 0002418527 scopus 로고    scopus 로고
    • An extensible probe architecture for network protocol performance measurement
    • Vancouver, British Columbia, September
    • G. Robert Malan and Farnam Jahanian. An extensible probe architecture for network protocol performance measurement. In Proceedings of ACM SIGCOMM, pages 177-185, Vancouver, British Columbia, September 1998.
    • (1998) Proceedings of ACM SIGCOMM , pp. 177-185
    • Robert Malan, G.1    Jahanian, F.2
  • 28
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • USENIX, editor November 7 - 12, 1999, Seattle, WA, USA, Berkeley, CA, USA USENIX
    • Martin Roesch. Snort - lightweight intrusion detection for networks. In USENIX, editor, Proceedings of the Thirteenth Systems Administration Conference (LISA XIII): November 7 - 12, 1999, Seattle, WA, USA, Berkeley, CA, USA, 1999. USENIX.
    • (1999) Proceedings of the Thirteenth Systems Administration Conference (LISA XIII)
    • Roesch, M.1
  • 31
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • July/August
    • Colleen Shannon and David Moore. The spread of the Witty worm. IEEE Security & Privacy, 2(4):46-50, July/August 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 36
    • 84878684747 scopus 로고    scopus 로고
    • Symantec Corporation
    • Symantec Corporation. DeepSight Analyzer. http://analyzer.securityfocus. com/, 2005.
    • (2005) DeepSight Analyzer
  • 37
    • 84878698009 scopus 로고    scopus 로고
    • Johannes Ullrich. DSHIELD. http://www.dshield.org, 2000.
    • (2000)
    • Ullrich, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.