메뉴 건너뛰기




Volumn 8115 LNCS, Issue , 2013, Pages 304-309

Protocol-independent detection of dictionary attacks

Author keywords

anomaly detection; network behavior analysis; traffic classes

Indexed keywords

ADVANCED DETECTIONS; ANOMALY DETECTION; DEEP PACKET INSPECTION; EFFECTIVE SOLUTION; INDUSTRY PRACTICES; NETWORK BEHAVIOR ANALYSIS; PRACTICAL EXPERIENCE; TRAFFIC CLASS;

EID: 84885796339     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40552-5_30     Document Type: Conference Paper
Times cited : (11)

References (11)
  • 2
    • 24344493979 scopus 로고    scopus 로고
    • CIDS: An agent-based intrusion detection system
    • Dasgupta, D., et al.: CIDS: An agent-based intrusion detection system. Computers & Security 24(5), 387-398 (2005)
    • (2005) Computers & Security , vol.24 , Issue.5 , pp. 387-398
    • Dasgupta, D.1
  • 3
    • 84885828686 scopus 로고    scopus 로고
    • retrieved online February 22, 2013
    • Dragon Research Group: SSH Password Authentication Report (2013), http://www.dragonresearchgroup.org/insight/sshpwauth.txt (retrieved online February 22, 2013)
    • (2013) SSH Password Authentication Report
  • 4
    • 84861990847 scopus 로고    scopus 로고
    • SSHCure: A Flow-Based SSH Intrusion Detection System
    • Sadre, R., Novotný, J., Č Celeda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. Springer, Heidelberg
    • Hellemons, L., Hendriks, L., Hofstede, R., Sperotto, A., Sadre, R., Pras, A.: SSHCure: A Flow-Based SSH Intrusion Detection System. In: Sadre, R., Novotný, J., Č Celeda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol. 7279, pp. 86-97. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7279 , pp. 86-97
    • Hellemons, L.1    Hendriks, L.2    Hofstede, R.3    Sperotto, A.4    Sadre, R.5    Pras, A.6
  • 9
    • 50049096256 scopus 로고    scopus 로고
    • A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks
    • Thames, J.L., Abler, R., Keeling, D.: A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks. In: IEEE Southeastcon 2008, pp. 84-89 (2008)
    • (2008) IEEE Southeastcon 2008 , pp. 84-89
    • Thames, J.L.1    Abler, R.2    Keeling, D.3
  • 11
    • 80051569378 scopus 로고    scopus 로고
    • A Flow-Level Taxonomy and Prevalence of Brute Force Attacks
    • Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part II. Springer, Heidelberg
    • Vykopal, J.: A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part II. CCIS, vol. 191, pp. 666-675. Springer, Heidelberg (2011)
    • (2011) CCIS , vol.191 , pp. 666-675
    • Vykopal, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.