메뉴 건너뛰기




Volumn , Issue , 2013, Pages 168-175

Network intrusion detection systems in high-speed traffic in computer networks

Author keywords

IDS; Network security; Open source

Indexed keywords

COMPUTER NETWORKS; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; DENIAL-OF-SERVICE ATTACK; DROPS; ELECTRONIC COMMERCE; INTRUSION DETECTION; OPEN SOURCE SOFTWARE; SPEED;

EID: 84893339941     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEBE.2013.26     Document Type: Conference Paper
Times cited : (34)

References (23)
  • 1
    • 84862510240 scopus 로고    scopus 로고
    • Feasibility of intrusion detection system with high performance computing: A survey
    • Dec
    • S. Beg, U. Naru, M. Ashraf, and S. Moshin, "Feasibility of intrusion detection system with high performance computing: A survey." Int. J. Advances in Computer Science Vol. 1, Dec 2010, pp. 26-35.
    • (2010) Int. J. Advances in Computer Science , vol.1 , pp. 26-35
    • Beg, S.1    Naru, U.2    Ashraf, M.3    Moshin, S.4
  • 4
    • 84893256616 scopus 로고    scopus 로고
    • TeleGeography Company Website Accessed 6 June 2012
    • TeleGeography Research, "Overview: Global bandwidth research products," TeleGeography Company Website, 2008. Accessed 6 June 2012 from: .
    • (2008) Overview: Global Bandwidth Research Products
  • 5
    • 19944424800 scopus 로고    scopus 로고
    • Real-time intrusion detection for high-speed networks
    • Jun
    • W. Jiang, H. Song, and Y. Dai, "Real-time intrusion detection for high-speed networks," Computers and Security, Vol. 24, Jun 2005, pp. 287-94.
    • (2005) Computers and Security , vol.24 , pp. 287-294
    • Jiang, W.1    Song, H.2    Dai, Y.3
  • 6
    • 84864299344 scopus 로고    scopus 로고
    • Research on the information security technology of university campus network
    • D. Jin and S. Lin, Eds. Berlin: Springer Verlag
    • C. Wang, Z. Zhang, and X. Song, "Research on the Information Security Technology of University Campus Network," in Advances in Computer Science and Information Engineering, D. Jin and S. Lin, Eds. Berlin: Springer Verlag, 2012, pp. 217-221.
    • (2012) Advances in Computer Science and Information Engineering , pp. 217-221
    • Wang, C.1    Zhang, Z.2    Song, X.3
  • 8
    • 79952000506 scopus 로고    scopus 로고
    • The future of the firewall
    • February
    • S. Gold, "The future of the firewall," Network Security, February 2011, pp. 13-15.
    • (2011) Network Security , pp. 13-15
    • Gold, S.1
  • 9
    • 84861492152 scopus 로고    scopus 로고
    • A study of methodologies used in intrusion detection and prevention system (IDPS)
    • March
    • D. Mudzingwa and R. Agrawal, "A study of methodologies used in intrusion detection and prevention system (IDPS)," Proc. IEEE SOUTHEASTCON Conf. March 2012, pp. 1-6.
    • (2012) Proc. IEEE SOUTHEASTCON Conf. , pp. 1-6
    • Mudzingwa, D.1    Agrawal, R.2
  • 10
    • 34547969527 scopus 로고    scopus 로고
    • The new front line: Estonia under cyberassault
    • July-Aug
    • M. Lesk, "The new front line: Estonia under cyberassault," Security & Privacy, Vol. 5 July-Aug 2007, pp. 76-79.
    • (2007) Security & Privacy , vol.5 , pp. 76-79
    • Lesk, M.1
  • 13
    • 79955858211 scopus 로고    scopus 로고
    • Implementation and evaluation of network intrusion detection systems
    • D. D. Kouvatos, Ed. Lecture Notes in Computer Science Heidelberg: Springer Verlag
    • M. Akhlaq, F. Alserhani, I. Awan, J. Mellor, A. J. Cullen, and A. Al-dhelaan, "Implementation and evaluation of network intrusion detection systems," in Network Performance Engineering, D. D. Kouvatos, Ed. Lecture Notes in Computer Science, Vol. 5233. Heidelberg: Springer Verlag, 2011, pp. 988-1016.
    • (2011) Network Performance Engineering , vol.5233 , pp. 988-1016
    • Akhlaq, M.1    Alserhani, F.2    Awan, I.3    Mellor, J.4    Cullen, A.J.5    Al-Dhelaan, A.6
  • 14
    • 79960605388 scopus 로고    scopus 로고
    • Improving the performance of intrusion detection using dialog-based payload aggregation
    • 2011 IEEE Conference. IEEE Press, April
    • T. Limmer and F. Dressler, "Improving the performance of intrusion detection using Dialog-based Payload Aggregation," Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference. IEEE Press, April 2011, pp. 822-827.
    • (2011) Computer Communications Workshops (INFOCOM WKSHPS) , pp. 822-827
    • Limmer, T.1    Dressler, F.2
  • 17
    • 34248393543 scopus 로고    scopus 로고
    • A taxonomy of parallel techniques for intrusion detection
    • ACM
    • P. Wheeler and E. Fulp, "A taxonomy of parallel techniques for intrusion detection," Proc. Ann. Southeast Conf. 2007, ACM, pp. 278-282.
    • (2007) Proc. Ann. Southeast Conf. , pp. 278-282
    • Wheeler, P.1    Fulp, E.2
  • 18
    • 36549001307 scopus 로고    scopus 로고
    • The need for a multi-perspective approach to solve the DDoS problem
    • 12 NOV
    • J. Hernandez-Herrero and J. A. Solworth, "The need for a multi-perspective approach to solve the DDoS problem," Bell Labs Technical J. 12 NOV 2007, pp. 121-130.
    • (2007) Bell Labs Technical J. , pp. 121-130
    • Hernandez-Herrero, J.1    Solworth, J.A.2
  • 19
    • 67649419077 scopus 로고    scopus 로고
    • Towards scalable intrusion detection
    • June 2009
    • S. A. Shaikh, et al, "Towards scalable intrusion detection," Network Security, 2009. June 2009, pp. 12-6.
    • (2009) Network Security , pp. 12-16
    • Shaikh, S.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.