메뉴 건너뛰기




Volumn , Issue , 2013, Pages 227-234

Towards real-time intrusion detection for NetFlow and IPFIX

Author keywords

Denial of service; Flow monitoring; Internet measurements; Intrusion detection; IPFIX; NetFlow

Indexed keywords

INDUSTRY; NETWORK ARCHITECTURE;

EID: 84894455825     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNSM.2013.6727841     Document Type: Conference Paper
Times cited : (43)

References (20)
  • 1
    • 84894466412 scopus 로고    scopus 로고
    • The Spamhaus Project, accessed on 9 August 2013
    • The Spamhaus Project, "Spamhaus, " 2013, accessed on 9 August 2013. [online]. Available: http://www. spamhaus. org
    • (2013)
  • 2
    • 84887465235 scopus 로고    scopus 로고
    • The New York Times, March, accessed on 9 August 2013
    • The New York Times, "Firm Is Accused of Sending Spam, and Fight Jams Internet, " March 2013, accessed on 9 August 2013. [online]. Available: http://www. nytimes. com/2013/03/27/technology/ internet/online-dispute-becomes- internet-snarling-attack. html
    • (2013) Firm Is Accused of Sending Spam, and Fight Jams Internet
  • 3
    • 84907926344 scopus 로고    scopus 로고
    • Ars Technica, April, accessed on 9 August 2013
    • Ars Technica, "Can a DDoS break the Internet? Sure just not all of it, " April 2013, accessed on 9 August 2013. [online]. Available: http://arstechnica. com/security/2013/04/ can-A-ddos-break-The-internet-sure- just-not-all-of-it/
    • (2013) Can A DDoS Break the Internet? Sure Just Not All of It
  • 4
    • 84904053098 scopus 로고    scopus 로고
    • Arbor Networks, December, accessed on 9 August 2013
    • Arbor Networks, "DDoS and Security Reports: The Arbor Networks Security Blog, " December 2012, accessed on 9 August 2013. [online]. Available: http://ddos. arbornetworks. com/2012/12/ lessons-learned-from-The-u- s-financial-services-ddos-attacks/
    • (2012) DDoS and Security Reports: The Arbor Networks Security Blog
  • 5
  • 13
    • 84894475442 scopus 로고    scopus 로고
    • Introduction to cisco iOS netFlow-A technical overview
    • Cisco Systems, May
    • Cisco Systems, "Introduction to Cisco IOS NetFlow-A Technical Overview, " White paper, May 2012.
    • (2012) White Paper
  • 14
    • 84894470407 scopus 로고    scopus 로고
    • Juniper Networks, Inc., November, accessed on 9 August 2013
    • Juniper Networks, Inc., "flow-inactive-timeout-Technical Documentation, " November 2012, accessed on 9 August 2013. [online]. Available: http://www. juniper. net/ techpubs/en US/junos/topics/reference/ configuration-statement/ flow-inactive-timeout-edit-forwarding-options. html
    • (2012) Flow-inactive-timeout-Technical Documentation
  • 15
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting sYN flooding attacks
    • V. A. Siris and F. Papagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, " Computer Communications, vol. 29, no. 9, pp. 1433-1442, 2006.
    • (2006) Computer Communications , vol.29 , Issue.9 , pp. 1433-1442
    • Siris, V.A.1    Papagalou, F.2
  • 16
    • 0036864028 scopus 로고    scopus 로고
    • EWMA techniques for computer intrusion detection through anomalous changes in event intensity
    • N. Ye, C. Borror, and Y. Zhang, "EWMA Techniques for Computer Intrusion Detection Through Anomalous Changes in Event Intensity, " Quality and Reliability Engineering International, vol. 18, no. 6, pp. 443-451, 2002.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.6 , pp. 443-451
    • Ye, N.1    Borror, C.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.