메뉴 건너뛰기




Volumn 40, Issue 1, 2014, Pages 307-324

Network attacks: Taxonomy, tools and systems

Author keywords

DoS; Network attacks; Protocol; Systems; Tools

Indexed keywords

COMPUTER SYSTEMS; DOS; NETWORK PROTOCOLS; RESEARCH; SURVEYS; TAXONOMIES; TOOLS;

EID: 84896319063     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2013.08.001     Document Type: Review
Times cited : (195)

References (63)
  • 2
    • 62249168871 scopus 로고    scopus 로고
    • A hybrid intrusion detection system design for computer network security
    • M. AydIn, A. Zaim, and K. Ceylan A hybrid intrusion detection system design for computer network security Computers and Electrical Engineering 35 3 2009 517 526
    • (2009) Computers and Electrical Engineering , vol.35 , Issue.3 , pp. 517-526
    • Aydin, M.1    Zaim, A.2    Ceylan, K.3
  • 3
    • 1942489982 scopus 로고    scopus 로고
    • Hacking techniques the tools that hackers use and how they are evolving to become more sophisticated
    • R. Barber Hacking techniques the tools that hackers use and how they are evolving to become more sophisticated Computer Fraud and Security 2001 3 2001 9 12
    • (2001) Computer Fraud and Security , vol.2001 , Issue.3 , pp. 9-12
    • Barber, R.1
  • 4
    • 35048886013 scopus 로고    scopus 로고
    • A robust classifier for passive TCP/IP fingerprinting
    • R. Beverly A robust classifier for passive TCP/IP fingerprinting Passive and Active Network Measurement 2004 158 167
    • (2004) Passive and Active Network Measurement , pp. 158-167
    • Beverly, R.1
  • 11
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion detection
    • DOI 10.1016/j.cor.2004.03.019, PII S0305054804000711, Application of Neural Networks
    • W.-H. Chen, S.-H. Hsu, and H.-P. Shen Application of SVM and ANN for intrusion detection Computer and Operation Research 32 10 2005 2617 2634 (Pubitemid 40219764)
    • (2005) Computers and Operations Research , vol.32 , Issue.10 , pp. 2617-2634
    • Chen, W.-H.1    Hsu, S.-H.2    Shen, H.-P.3
  • 12
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • DOI 10.1109/TPDS.2007.1111
    • Y. Chen, K. Hwang, and W.-S. Ku Collaborative detection of DDoS attacks over multiple network domains IEEE Transactions on Parallel Distributed Systems 18 12 2007 1649 1662 (Pubitemid 350142414)
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 15
    • 84876939080 scopus 로고    scopus 로고
    • Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues
    • I. Corona, G. Giacinto, and F. Roli Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues Information Sciences 239 2013 201 225
    • (2013) Information Sciences , vol.239 , pp. 201-225
    • Corona, I.1    Giacinto, G.2    Roli, F.3
  • 16
    • 0142253852 scopus 로고    scopus 로고
    • ADAM a testbed for exploring the use of data mining in intrusion detection
    • B. Daniel, C. Julia, J. Sushil, and W. Ningning ADAM a testbed for exploring the use of data mining in intrusion detection ACM SIGMOD Record 30 4 2001 15 24
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 15-24
    • Daniel, B.1    Julia, C.2    Sushil, J.3    Ningning, W.4
  • 18
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi Towards a taxonomy of intrusion-detection systems Computer Networks 31 8 1999 805 822
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 19
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi Towards a taxonomy of intrusion-detection systems Computer Networks 31 9 1999 805 822
    • (1999) Computer Networks , vol.31 , Issue.9 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 25
    • 79953811849 scopus 로고    scopus 로고
    • A survey of outlier detection methods in network anomaly identification
    • P. Gogoi, D. Bhattacharyya, B. Borah, and J.K. Kalita A survey of outlier detection methods in network anomaly identification Computer Journal 54 4 2011 570 588
    • (2011) Computer Journal , vol.54 , Issue.4 , pp. 570-588
    • Gogoi, P.1    Bhattacharyya, D.2    Borah, B.3    Kalita, J.K.4
  • 27
    • 34748870795 scopus 로고    scopus 로고
    • A framework for an adaptive intrusion detection system using Bayesian network
    • 4258675, ISI 2007: 2007 IEEE Intelligence and Security Informatics
    • Jemili F, Zaghdoud M, Ben Ahmed M. A framework for an adaptive intrusion detection system using Bayesian network. In: Proceedings of the IEEE intelligence and security informatics; 2007. p. 66-70. (Pubitemid 47469216)
    • (2007) ISI 2007: 2007 IEEE Intelligence and Security Informatics , pp. 66-70
    • Jemili, F.1    Zaghdoud, M.2    Ahmed, M.B.3
  • 31
    • 26844582131 scopus 로고    scopus 로고
    • Defending against spoofed DDoS attacks with path fingerprint
    • DOI 10.1016/j.cose.2005.03.005, PII S0167404805000465
    • F.-Y. Lee, and S.-P. Shieh Defending against spoofed DDoS attacks with path fingerprint Computers and Security 24 2005 571 586 (Pubitemid 41455416)
    • (2005) Computers and Security , vol.24 , Issue.7 , pp. 571-586
    • Lee, F.-Y.1    Shieh, S.2
  • 33
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • R.P. Lippmann, and R.K. Cunningham Improving intrusion detection performance using keyword selection and neural networks Computer Networks 34 4 2000 597 603
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 597-603
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 34
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T.F. Lunt A survey of intrusion detection techniques Computers and Security 12 4 1993 405 418
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 35
    • 79551540583 scopus 로고    scopus 로고
    • Anonymous serious threat or mere annoyance?
    • S. Mansfield-Devine Anonymous serious threat or mere annoyance? Network Security 2001 1 2011 4 10
    • (2011) Network Security , vol.2001 , Issue.1 , pp. 4-10
    • Mansfield-Devine, S.1
  • 36
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • DOI 10.1109/TDSC.2005.35
    • J. Mirkovic, and P. Reiher D-ward a source-end defense against flooding denial-of-service attacks IEEE Transactions on Dependable Secure Computing 2 3 2005 216 232 (Pubitemid 41560432)
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 38
    • 84896319768 scopus 로고    scopus 로고
    • SANS Institute InfoSec Reading Room
    • Norton D. An Ettercap primer. SANS Institute InfoSec Reading Room; 2004.
    • (2004) An Ettercap Primer
    • Norton, D.1
  • 39
    • 84892191476 scopus 로고    scopus 로고
    • Wireshark and Ethereal network protocol analyzer toolkit
    • Orebaugh A, Ramirez G, Beale J. Wireshark and Ethereal network protocol analyzer toolkit. Syngress; 2006.
    • (2006) Syngress
    • Orebaugh, A.1    Ramirez, G.2    Beale, J.3
  • 40
    • 0033295259 scopus 로고    scopus 로고
    • Bro a system for detecting network intruders in real-time
    • V. Paxson Bro a system for detecting network intruders in real-time Computer Networks 31 23 1999 2435 2463
    • (1999) Computer Networks , vol.31 , Issue.23 , pp. 2435-2463
    • Paxson, V.1
  • 41
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems ACM Computing Surveys (CSUR) 39 1 2007 3
    • (2007) ACM Computing Surveys (CSUR) , vol.39 , Issue.1 , pp. 3
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 42
    • 78449249325 scopus 로고    scopus 로고
    • Network forensic frameworks survey and research challenges
    • E.S. Pilli, R. Joshi, and R. Niyogi Network forensic frameworks survey and research challenges Digital Investigation 7 1 2010 14 27
    • (2010) Digital Investigation , vol.7 , Issue.1 , pp. 14-27
    • Pilli, E.S.1    Joshi, R.2    Niyogi, R.3
  • 49
    • 84896315688 scopus 로고    scopus 로고
    • An introduction to HTTP fingerprinting
    • S. Shah An introduction to HTTP fingerprinting Net-Square Solutions 2004 1 21
    • (2004) Net-Square Solutions , pp. 1-21
    • Shah, S.1
  • 55
    • 0002067431 scopus 로고    scopus 로고
    • Netstat a network-based intrusion detection system
    • G. Vigna, and R.A. Kemmerer Netstat a network-based intrusion detection system Journal of Computer Security 7 1 1999 37 71
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 57
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Y. Xie, and S.Z. Yu Monitoring the application-layer DDoS attacks for popular websites IEEE/ACM Transactions on Networking 17 1 2009 15 25
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.Z.2
  • 58
    • 19544392357 scopus 로고    scopus 로고
    • Remote OS detection via TCP/IP stack fingerprinting
    • F. Yarochkin Remote OS detection via TCP/IP stack fingerprinting Phrack Magazine 17 3 1998 1 10
    • (1998) Phrack Magazine , vol.17 , Issue.3 , pp. 1-10
    • Yarochkin, F.1
  • 59
    • 0036575252 scopus 로고    scopus 로고
    • First-order versus high-order stochastic models for computer intrusion detection
    • DOI 10.1002/qre.478
    • N. Ye, T. Ehiabor, and Y. Zhang First-order versus high-order stochastic models for computer intrusion detection Quality and Reliable Engineering International 18 3 2002 243 250 (Pubitemid 34699726)
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.3 , pp. 243-250
    • Ye, N.1    Ehiabor, T.2    Zhang, Y.3
  • 61
    • 47149094655 scopus 로고    scopus 로고
    • A detection and offense mechanism to defend against application layer DDoS attacks
    • IEEE, National University of Defense Technology, Changsha
    • Yu J, Li Z, Chen H, Chen X. A detection and offense mechanism to defend against application layer DDoS attacks. In: Proceedings of the 3rd international conference on networking and services. IEEE, National University of Defense Technology, Changsha, 2007. p. 54-60.
    • (2007) Proceedings of the 3rd International Conference on Networking and Services , pp. 54-60
    • Yu, J.1    Li, Z.2    Chen, H.3    Chen, X.4
  • 63
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • C.V. Zhou, C. Leckie, and S. Karunasekera A survey of coordinated attacks and collaborative intrusion detection Computers and Security 29 1 2010 124 140
    • (2010) Computers and Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.