메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 109-114

Honeypots for distributed denial-of-service attacks

Author keywords

Communication system traffic control; Computer crime; Computer networks; Distributed computing; IP networks; Laboratories; Proposals; Protection; Web and internet services; Web server

Indexed keywords

COMPUTER CONTROL SYSTEMS; COMPUTER CRIME; COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; DISTRIBUTED PARAMETER NETWORKS; INTERNET; INTERNET PROTOCOLS; LABORATORIES; NETWORK SECURITY; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION TRAFFIC; TRANSMISSION CONTROL PROTOCOL; WEB SERVICES;

EID: 84903755100     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ENABL.2002.1029997     Document Type: Conference Paper
Times cited : (82)

References (19)
  • 9
    • 84948653812 scopus 로고    scopus 로고
    • HoneyNet Project. http://project.honeynet.org/.
  • 11
    • 84948688160 scopus 로고    scopus 로고
    • April
    • Microsoft Technical Support. Myriad Escaped Characters Vulnerability. http://www.microsoft.com/technet/security/bulletin/fq00-023.asp, April 2000.
    • (2000) Myriad Escaped Characters Vulnerability
  • 12
    • 0003375670 scopus 로고    scopus 로고
    • An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
    • July
    • V. Paxson. An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. Computer Communication Review, 31(3), July 2001.
    • (2001) Computer Communication Review , vol.31 , Issue.3
    • Paxson, V.1
  • 18
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and Authenticated Marking Schemes for IP Traceback
    • April
    • D. Song and A. Perrig. Advanced and Authenticated Marking Schemes for IP Traceback. In Proceedings of ACM INFOCOM 2001, April 2001.
    • (2001) Proceedings of ACM INFOCOM 2001
    • Song, D.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.