메뉴 건너뛰기




Volumn 16, Issue 4, 2014, Pages 407-414

A global-local approach for estimating the internet's threat level

Author keywords

Computer virus; Forecasting; Intrusion detection; Security; Time series

Indexed keywords

APPLICATION PROGRAMS; DENIAL-OF-SERVICE ATTACK; FORECASTING; INTRUSION DETECTION; NETWORK SECURITY; OPEN SOURCE SOFTWARE; OPEN SYSTEMS; SAMPLING; TIME SERIES;

EID: 84907188077     PISSN: 12292370     EISSN: 19765541     Source Type: Journal    
DOI: 10.1109/JCN.2014.000070     Document Type: Article
Times cited : (2)

References (30)
  • 1
    • 84907206990 scopus 로고    scopus 로고
    • The internet of things - How the next evolution of the internet is changing everything
    • white paper, Apr.
    • D. Evans, "The Internet of Things - How the next evolution of the internet is changing everything," white paper, Cisco IBSG, Apr. 2011.
    • (2011) Cisco IBSG
    • Evans, D.1
  • 2
    • 84907217070 scopus 로고    scopus 로고
    • Internet of things (IoT) - Enabling technologies, applications and open issues
    • IGI Global Press, 3rd ed
    • T. Kaukalias and P. Chatzimisios, "Internet of Things (IoT) - enabling technologies, applications and open issues," in Encyclopedia of Information Science and Technology, IGI Global Press, 3rd ed., 2014.
    • (2014) Encyclopedia of Information Science and Technology
    • Kaukalias, T.1    Chatzimisios, P.2
  • 3
    • 84907217069 scopus 로고    scopus 로고
    • Russia: Hidden chips 'launch spam attacks from irons'
    • (Oct.). [Online]
    • (2013, Oct.). "Russia: Hidden chips 'launch spam attacks from irons'." BBC News. [Online] Available: http://www.bbc.com/news/blogsnews-from-elsewhere-24707337
    • (2013) BBC News
  • 4
    • 84907217068 scopus 로고    scopus 로고
    • Fridge sends spam emails as attack hits smart gadgets
    • (Jan.). [Online]
    • (2014, Jan.). "Fridge sends spam emails as attack hits smart gadgets." BBC News. [Online] Available: http://www.bbc.com/news/technology-25780908
    • (2014) BBC News
  • 5
    • 84904389907 scopus 로고    scopus 로고
    • Threat implications of the Internet of Things
    • June
    • M. Covington and R. Carskadden, "Threat implications of the Internet of Things," in Proc. CyCon, June 2013, pp. 1-12.
    • (2013) Proc. CyCon , pp. 1-12
    • Covington, M.1    Carskadden, R.2
  • 6
    • 84891714668 scopus 로고    scopus 로고
    • Denial-of-service detection in 6LoWPAN based Internet of Things
    • Oct.
    • P. Kasinathan et al., "Denial-of-service detection in 6LoWPAN based Internet of Things," in Proc. IEEE WiMob, Oct. 2013, pp. 600-607.
    • (2013) Proc. IEEE WiMob , pp. 600-607
    • Kasinathan, P.1
  • 7
    • 84883394343 scopus 로고    scopus 로고
    • Practical secure communication for integrating wireless sensor networks into the Internet of Things
    • L. Fagen and X. Pan, "Practical secure communication for integrating wireless sensor networks into the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3677-3684, 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3677-3684
    • Fagen, L.1    Pan, X.2
  • 8
    • 84893439288 scopus 로고    scopus 로고
    • Smart grid wireless network security requirements analysis
    • Aug.
    • K. A. Ahmed, Z. Aung, and D. Svetinovic, "Smart grid wireless network security requirements analysis," in Proc. IEEE GreenCom, Aug. 2013, pp. 871-878.
    • (2013) Proc. IEEE GreenCom , pp. 871-878
    • Ahmed, K.A.1    Aung, Z.2    Svetinovic, D.3
  • 9
    • 84899910987 scopus 로고    scopus 로고
    • DoS attack detection in Internet-connected vehicles
    • Dec.
    • J. Soryal and T. Saadawi, "DoS attack detection in Internet-connected vehicles," in Proc. ICCVE, Dec. 2013, pp. 7-13.
    • (2013) Proc. ICCVE , pp. 7-13
    • Soryal, J.1    Saadawi, T.2
  • 10
    • 84907206989 scopus 로고    scopus 로고
    • Measuring the Internet's threat level: A global-local approach
    • June
    • S. Kollias et al., "Measuring the Internet's threat level: A global-local approach," in Proc. IEEE PEDIWESA, June 2014.
    • (2014) Proc. IEEE PEDIWESA
    • Kollias, S.1
  • 11
    • 16344396406 scopus 로고    scopus 로고
    • Monitoring and early warning for internet worms
    • Oct.
    • C. C. Zou et al., "Monitoring and early warning for internet worms," in Proc. ACM CSS, Oct. 2003, pp. 190-199.
    • (2003) Proc. ACM CSS , pp. 190-199
    • Zou, C.C.1
  • 12
    • 0002473030 scopus 로고
    • DIDS (Distributed Intrusion Detection System)- motivation, architecture, and an early prototype
    • S. R. Snapp et al., "DIDS (Distributed Intrusion Detection System)- motivation, architecture, and an early prototype," in Proc. National Comput. Security Conf., 1991, pp. 167-176.
    • (1991) Proc. National Comput. Security Conf. , pp. 167-176
    • Snapp, S.R.1
  • 14
    • 1642434224 scopus 로고    scopus 로고
    • Using sensor networks and data fusion for early detection of active worms
    • 23 Sept.
    • V. H. Berk, R. S. Gray, and G. Bakos, "Using sensor networks and data fusion for early detection of active worms," in Proc. Airo Sense, 23 Sept. 2003, pp. 92-104.
    • (2003) Proc. Airo Sense , pp. 92-104
    • Berk, V.H.1    Gray, R.S.2    Bakos, G.3
  • 15
  • 16
    • 34547936756 scopus 로고    scopus 로고
    • A PROactive malware identification system based on the computer hygiene principles
    • V. Vlachos and D. Spinellis, "A PROactive malware identification system based on the computer hygiene principles," Inform. Management Comput. Security, vol. 15, no. 4, pp. 295-312, 2007.
    • (2007) Inform. Management Comput. Security , vol.15 , Issue.4 , pp. 295-312
    • Vlachos, V.1    Spinellis, D.2
  • 18
    • 84907217067 scopus 로고    scopus 로고
    • [Online]
    • "Cisco IronPort reputation filters." [Online]. Available: http://www.cisco.com/c/dam/en/us/products/collateral/security/email-security-appliance/ironport-reputation-filters.pdf
    • Cisco IronPort Reputation Filters
  • 19
    • 84907213102 scopus 로고    scopus 로고
    • [Online]
    • "Dshield." [Online]. Available: http://www.dshield.org/
    • Dshield
  • 20
    • 84872583362 scopus 로고    scopus 로고
    • Visual analytics for BGP monitoring and prefix hijacking identification
    • E. Biersack et al., "Visual analytics for BGP monitoring and prefix hijacking identification," IEEE Network, vol. 26, no. 6, pp. 33-39, 2012.
    • (2012) IEEE Network , vol.26 , Issue.6 , pp. 33-39
    • Biersack, E.1
  • 21
    • 78649239474 scopus 로고    scopus 로고
    • Spam cloud: A map reduce based antispam architecture
    • Aug.
    • G. Caruana, M. Li, and H. Qi, "Spam Cloud: A Map Reduce based antispam architecture," in Proc. FSKD, vol. 6, Aug. 2010, pp. 3003-3006.
    • (2010) Proc. FSKD , vol.6 , pp. 3003-3006
    • Caruana, G.1    Li, M.2    Qi, H.3
  • 22
    • 79958726067 scopus 로고    scopus 로고
    • HARMUR: Storing and analyzing historic data on malicious domains
    • Apr.
    • C. Leita and M. Cova, "HARMUR: Storing and analyzing historic data on malicious domains," in Proc. Euro Sys BADGERS, Apr. 2011, pp. 44-51.
    • (2011) Proc. Euro Sys BADGERS , pp. 44-51
    • Leita, C.1    Cova, M.2
  • 23
    • 51549108952 scopus 로고    scopus 로고
    • SGNET: A worldwide deployable framework to support the analysis of malware threat models
    • May
    • C. Leita and M. Dacier, "SGNET: A worldwide deployable framework to support the analysis of malware threat models," in Proc. EDCC, May 2008, pp. 99-109.
    • (2008) Proc. EDCC , pp. 99-109
    • Leita, C.1    Dacier, M.2
  • 24
    • 84877647628 scopus 로고    scopus 로고
    • Performance evaluation of security routing strategies to avoid DoS attacks in WSN
    • Dec.
    • L. Mokdad and J. Ben-Othman, "Performance evaluation of security routing strategies to avoid DoS attacks in WSN," in Proc. IEEE GLOBECOM, Dec. 2012, pp. 2859-2863.
    • (2012) Proc. IEEE GLOBECOM , pp. 2859-2863
    • Mokdad, L.1    Ben-Othman, J.2
  • 25
    • 84875228943 scopus 로고    scopus 로고
    • IBC-HWMP: A novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s
    • J. Ben-Othman and Y. I. Saavedra Benitez, "IBC-HWMP: A novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s," Concurrency Comput.: Practice Experience, vol. 25, no. 5, pp. 686-700, 2013.
    • (2013) Concurrency Comput.: Practice Experience , vol.25 , Issue.5 , pp. 686-700
    • Ben-Othman, J.1    Saavedra Benitez, Y.I.2
  • 28
    • 34547927497 scopus 로고    scopus 로고
    • PROMISing steps towards computer hygiene
    • July
    • V. Vlachos, A. Raptis, and D. Spinellis, "PROMISing steps towards computer hygiene," in Proc. INC, July 2006, pp. 229-236.
    • (2006) Proc. INC , pp. 229-236
    • Vlachos, V.1    Raptis, A.2    Spinellis, D.3
  • 29
    • 83355172245 scopus 로고    scopus 로고
    • A lightweight SOAP over CoAP transport binding for resource constraint networks
    • G. Moritz, F. Golatowski, and D. Timmermann, "A lightweight SOAP over CoAP transport binding for resource constraint networks," in Proc. MASS, 2011, pp. 861-866.
    • (2011) Proc. MASS , pp. 861-866
    • Moritz, G.1    Golatowski, F.2    Timmermann, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.