메뉴 건너뛰기




Volumn 33, Issue , 2014, Pages 42-52

An IP traceback protocol using a compressed hash table, a sinkhole router and data mining based on network forensics against network attacks

Author keywords

Association rule; Attack packet rule; Attack pattern; Compressed Hash Table; Hash table; IP Traceback Protocol; Sinkhole router

Indexed keywords

APRIORI ALGORITHMS; ATTACK PACKETS; ATTACK PATTERNS; HASH TABLE; IP TRACEBACK; MEMORY EFFICIENCY; NETWORK FORENSICS; SOURCE PATH ISOLATION ENGINE;

EID: 84893008558     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2013.10.023     Document Type: Article
Times cited : (31)

References (44)
  • 5
    • 80655134667 scopus 로고    scopus 로고
    • Proposal for and evaluation of improved method of hash-based IP traceback system
    • 10-12 December
    • T. Kai, A. Hashiguchi, H. Nakatani, Proposal for and evaluation of improved method of hash-based IP traceback system, in: CSA'09, 2nd International Conference, 10-12 December 2009, pp. 1-7.
    • (2009) CSA'09, 2nd International Conference , pp. 1-7
    • Kai, T.1    Hashiguchi, A.2    Nakatani, H.3
  • 8
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • December 3-8, New Orleans, Louisiana, USA
    • H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, in: Proceedings of Usenix LISA'00, December 3-8, New Orleans, Louisiana, USA, 2000.
    • (2000) Proceedings of Usenix LISA'00
    • Burch, H.1    Cheswick, B.2
  • 11
    • 51649130217 scopus 로고    scopus 로고
    • A more practical approach for single-packet IP traceback using packet logging and marking
    • C. Gong, and K. Sarac A more practical approach for single-packet IP traceback using packet logging and marking IEEE Transactions on Parallel and Distributed Systems 19 10 2008 1310 1324
    • (2008) IEEE Transactions on Parallel and Distributed Systems , vol.19 , Issue.10 , pp. 1310-1324
    • Gong, C.1    Sarac, K.2
  • 12
    • 0014814325 scopus 로고
    • Space/time trade-offs in Hash coding with allowable errors
    • B.H. Bloom Space/time trade-offs in Hash coding with allowable errors Communications of the ACM 13 7 1970 422 426
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 13
    • 0025432881 scopus 로고
    • Optimal semi-joins for distributed database systems
    • J.K. Mullin Optimal semi-joins for distributed database systems IEEE Transactions on Software Engineering 16 5 1990 558 560
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.5 , pp. 558-560
    • Mullin, J.K.1
  • 17
    • 0036349210 scopus 로고    scopus 로고
    • Probabilistic location and routing
    • New York, NY, United States, June
    • S.C. Rhea, J. Kubiatowicz, Probabilistic location and routing, in: Proc. IEEE INFOCOM, New York, NY, United States, June 2004, pp. 1248-1257.
    • (2004) Proc. IEEE INFOCOM , pp. 1248-1257
    • Rhea, S.C.1    Kubiatowicz, J.2
  • 18
    • 0036498835 scopus 로고    scopus 로고
    • An architecture for secure wide-area service discovery
    • DOI 10.1023/A:1013772027164, Selected Paper from MobiCom 99
    • T.D. Hodes, S.E. Czerwinski, and B.Y. Zhao An architecture for secure wide-area service discovery Wireless Networks 8 2-3 2002 213 230 (Pubitemid 34168128)
    • (2002) Wireless Networks , vol.8 , Issue.2-3 , pp. 213-230
    • Hodes, T.D.1    Czerwinski, S.E.2    Zhao, B.Y.3    Joseph, A.D.4    Katz, R.H.5
  • 20
    • 20544441668 scopus 로고    scopus 로고
    • Bringing efficient advanced queries to distributed hash tables
    • Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
    • D. Bauer, P. Hurley, R. Pletka, M. Waldvogel, Bringing efficient advanced queries to distributed hash tables, in: Proc. IEEE Conference on Local Computer Networks, Tampa, FL, United States, November 2004, pp. 6-14. (Pubitemid 40845188)
    • (2004) Proceedings - Conference on Local Computer Networks, LCN , pp. 6-14
    • Bauer, D.1    Hurley, P.2    Pletka, R.3    Waldvogel, M.4
  • 22
    • 8644274010 scopus 로고    scopus 로고
    • Analysis and management of streaming data: A survey
    • C. Jin, W. Qian, and A. Zhou Analysis and management of streaming data: a survey Journal of Software 15 8 2004 1172 1181
    • (2004) Journal of Software , vol.15 , Issue.8 , pp. 1172-1181
    • Jin, C.1    Qian, W.2    Zhou, A.3
  • 24
    • 0036806148 scopus 로고    scopus 로고
    • Compressed bloom filters
    • DOI 10.1109/TNET.2002.803864
    • M. Mitzenmacher Compressed bloom filters IEEE/ACM Transactions on Networking 10 5 2002 604 612 (Pubitemid 35312139)
    • (2002) IEEE/ACM Transactions on Networking , vol.10 , Issue.5 , pp. 604-612
    • Mitzenmacher, M.1
  • 27
    • 8344263038 scopus 로고    scopus 로고
    • Space-code bloom filter for efficient per-flow traffic measurement
    • Hongkong, China, March
    • A. Kumar, J. Xu, J. Wang, O. Spatschek, L. Li, Space-code bloom filter for efficient per-flow traffic measurement, in: Proc. IEEE INFOCOM, Hongkong, China, March 2004, pp. 1762-1773.
    • (2004) Proc. IEEE INFOCOM , pp. 1762-1773
    • Kumar, A.1    Xu, J.2    Wang, J.3    Spatschek, O.4    Li, L.5
  • 29
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. Broder, and M. Mitzenmacher Network applications of bloom filters: a survey Internet Mathematics 1 4 2005 485 509
    • (2005) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 30
    • 84893007668 scopus 로고    scopus 로고
    • A forensic based IITN(Improved IP traceback against network attacks) Protocol, IST
    • Shanghai, China
    • E.H. Jeong, B.K. Lee, I.N. Jung, A forensic based IITN(Improved IP traceback against network attacks) Protocol, IST, in: Proceedings International Conference, IST2012, Shanghai, China, 2012, pp. 361-364.
    • (2012) Proceedings International Conference, IST2012 , pp. 361-364
    • Jeong, E.H.1    Lee, B.K.2    Jung, I.N.3
  • 32
    • 0001882616 scopus 로고
    • Fast algorithms for mining association rules
    • Santiago, Chile
    • R. Agrawal, R. Srikant, Fast algorithms for mining association rules, in: Proceedings of the 20th VLDB Conference, Santiago, Chile, 1994. http://rakesh.agrawal-family.com/papers/vldb94apriori.pdf.
    • (1994) Proceedings of the 20th VLDB Conference
    • Agrawal, R.1    Srikant, R.2
  • 33
    • 0031220368 scopus 로고    scopus 로고
    • Using a hash-based method with transaction trimming for mining association rules
    • J.S. Park, M.S. Chen, and P.S. Yu Using a Hash-based method with transaction trimming for mining association rules The IEEE Transactions on Knowledge and Data Engineering 9 5 1997 813 825 (Pubitemid 127773161)
    • (1997) IEEE Transactions on Knowledge and Data Engineering , vol.9 , Issue.5 , pp. 813-825
    • Park, J.S.1    Chen, M.-S.2    Yu, P.S.3
  • 35
    • 77951138792 scopus 로고    scopus 로고
    • Study on application of apriori algorithm in data mining
    • January 22-24
    • Y. Liu, Study on application of apriori algorithm in data mining, in: Computer Modeling and Simulation, ICCMS'10, January 22-24, 2010, pp. 111-114.
    • (2010) Computer Modeling and Simulation, ICCMS'10 , pp. 111-114
    • Liu, Y.1
  • 36
    • 84978638470 scopus 로고    scopus 로고
    • Association rule generation using apriori Mend algorithm for student's placement
    • D.M.D. Angeline, and I.S.P. James Association rule generation using apriori Mend algorithm for student's placement International Journal of Emerging Sciences 2 1 2012 78 86
    • (2012) International Journal of Emerging Sciences , vol.2 , Issue.1 , pp. 78-86
    • Angeline, D.M.D.1    James, I.S.P.2
  • 40
    • 84893012006 scopus 로고    scopus 로고
    • Draft text of Rec. X.tb-ucr: Traceback use cases and capabilities
    • T. Huirong, R. Brackney, H.Y. Youm, Draft text of Rec. X.tb-ucr: traceback use cases and capabilities, TD4158, ITU-T SG17, 2008.
    • (2008) TD4158, ITU-T SG17
    • Huirong, T.1    Brackney, R.2    Youm, H.Y.3
  • 43
    • 84893006037 scopus 로고    scopus 로고
    • Network Simulator (ns-2)
    • Network Simulator (ns-2). http://www.isi.edu/nsnam/ns.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.