메뉴 건너뛰기




Volumn 8713 LNCS, Issue PART 2, 2014, Pages 365-382

LESS is more: Host-agent based simulator for large-scale evaluation of security systems

Author keywords

Agent Based; Data Challenges; Large Scale Security; Simulation; Stochastic

Indexed keywords

DENIAL-OF-SERVICE ATTACK; MALWARE; NETWORK SECURITY; STOCHASTIC SYSTEMS;

EID: 84906508304     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11212-1_21     Document Type: Conference Paper
Times cited : (5)

References (34)
  • 1
    • 33846200876 scopus 로고    scopus 로고
    • Entropy based worm and anomaly detection in fast ip networks
    • Wagner, A., Plattner, B.: Entropy based worm and anomaly detection in fast ip networks. In: WETICE (2005)
    • (2005) WETICE
    • Wagner, A.1    Plattner, B.2
  • 2
    • 84857332705 scopus 로고    scopus 로고
    • Cross-domain collaborative anomaly detection: So far yet so close
    • In: Sommer, R., Balzarotti, D., Maier, G. (eds.) Springer, Heidelberg
    • Boggs, N., Hiremagalore, S., Stavrou, A., Stolfo, S.J.: Cross-domain collaborative anomaly detection: so far yet so close. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 142-160. Springer, Heidelberg (2011)
    • (2011) RAID 2011. LNCS , vol.6961 , pp. 142-160
    • Boggs, N.1    Hiremagalore, S.2    Stavrou, A.3    Stolfo, S.J.4
  • 3
    • 85077707798 scopus 로고    scopus 로고
    • Highly predictive blacklisting
    • Zhang, J., Porras, P., Ullrich, J.: Highly predictive blacklisting. In: USENIX Security, vol. 8, pp. 107-122 (2008)
    • (2008) USENIX Security , vol.8 , pp. 107-122
    • Zhang, J.1    Porras, P.2    Ullrich, J.3
  • 7
    • 85084161642 scopus 로고    scopus 로고
    • Challenges in experimenting with botnet detection systems
    • Aviv, A.J., Haeberlen, A.: Challenges in experimenting with botnet detection systems. In: USENIX 4th CSET Workshop (2011)
    • (2011) USENIX 4th CSET Workshop
    • Aviv, A.J.1    Haeberlen, A.2
  • 12
    • 70349671163 scopus 로고    scopus 로고
    • Rapid: Shrinking the congestion-control timescale
    • IEEE
    • Konda, V., Kaur, J.: Rapid: Shrinking the congestion-control timescale. In: IEEE INFOCOM 2009, pp. 1-9. IEEE (2009)
    • (2009) IEEE INFOCOM 2009 , pp. 1-9
    • Konda, V.1    Kaur, J.2
  • 13
    • 8344272005 scopus 로고    scopus 로고
    • Stochastic models for generating synthetic http source traffic
    • IEEE
    • Cao, J., Cleveland, W.S., Gao, Y., Jeffay, K., Smith, F.D., Weigle, M.: Stochastic models for generating synthetic http source traffic. In: INFOCOM 2004, vol. 3, pp. 1546-1557. IEEE (2004)
    • (2004) INFOCOM 2004 , vol.3 , pp. 1546-1557
    • Cao, J.1    Cleveland, W.S.2    Gao, Y.3    Jeffay, K.4    Smith, F.D.5    Weigle, M.6
  • 14
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • IEEE
    • Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: IEEE INFOCOM 2003, pp. 1901-1910. IEEE (2003)
    • (2003) IEEE INFOCOM 2003 , pp. 1901-1910
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 16
    • 44049089796 scopus 로고    scopus 로고
    • Recent advances in network intrusion detection system tuning
    • Sommers, J., Yegneswaran, V., Barford, P.: Recent advances in network intrusion detection system tuning. In: IEEE 40th Annual CISS, pp. 1490-1495 (2006)
    • (2006) IEEE 40th Annual CISS , pp. 1490-1495
    • Sommers, J.1    Yegneswaran, V.2    Barford, P.3
  • 17
    • 34248638605 scopus 로고    scopus 로고
    • Simulating non-scanning worms on peer-to-peer networks
    • Chen, G., Gray, R.S.: Simulating non-scanning worms on peer-to-peer networks. In: ACM INFOSCALE, p. 29 (2006)
    • (2006) ACM INFOSCALE , pp. 29
    • Chen, G.1    Gray, R.S.2
  • 19
    • 0037076425 scopus 로고    scopus 로고
    • Agent-based modeling: Methods and techniques for simulating human systems
    • Bonabeau, E.: Agent-based modeling: Methods and techniques for simulating human systems. PNAS 99(suppl. 3), 7280-7287 (2002)
    • (2002) PNAS , vol.99 , Issue.SUPPL. 3 , pp. 7280-7287
    • Bonabeau, E.1
  • 21
    • 84906490384 scopus 로고    scopus 로고
    • Dshield.org, http://www.dshield.org/
  • 22
    • 84906499846 scopus 로고    scopus 로고
    • Caida data overview, http://www.caida.org/data/overview/
  • 23
    • 84906499847 scopus 로고    scopus 로고
    • Argus: Audit records generation and utilization system
    • Argus: Audit records generation and utilization system, http://qosient.com/argus/
  • 27
    • 84905692209 scopus 로고    scopus 로고
    • Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains
    • Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 1, 80 (2011)
    • (2011) Leading Issues in Information Warfare & Security Research , vol.1 , pp. 80
    • Hutchins, E.M.1    Cloppert, M.J.2    Amin, R.M.3
  • 28
    • 84906518403 scopus 로고    scopus 로고
    • Plot digitizer, http://plotdigitizer.sourceforge.net/
  • 32
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509-512 (1999)
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabasi, A.L.1    Albert, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.