메뉴 건너뛰기




Volumn 11, Issue 1, 2015, Pages 104-115

Penetration testing and network auditing: Linux

Author keywords

Network attack; Network auditing; Network forensic

Indexed keywords

COMPUTER OPERATING SYSTEMS; INTERNET; LINUX; NETWORK SECURITY; PERSONAL COMPUTING;

EID: 84928553068     PISSN: 1976913X     EISSN: 2092805X     Source Type: Journal    
DOI: 10.3745/JIPS.03.0013     Document Type: Article
Times cited : (7)

References (16)
  • 1
    • 79551507966 scopus 로고    scopus 로고
    • Cyber attacks: awareness
    • E. G. Amoroso, "Cyber attacks: awareness," Network Security, vol. 2011, pp. 10-16, 2011.
    • (2011) Network Security , vol.2011 , pp. 10-16
    • Amoroso, E.G.1
  • 2
    • 77955582072 scopus 로고    scopus 로고
    • The challenge of cyber attack deterrence
    • G. Kenneth, "The challenge of cyber attack deterrence," Computer Law & Security Review, vol. 26, pp. 298-303, 2010.
    • (2010) Computer Law & Security Review , vol.26 , pp. 298-303
    • Kenneth, G.1
  • 3
    • 79951553312 scopus 로고    scopus 로고
    • The dark side of the Internet: Attacks, costs and responses
    • W. Kim, O.-R. Jeong, C. Kim, and J. So, "The dark side of the Internet: Attacks, costs and responses," Information Systems, vol. 36, pp. 675-705, 2011.
    • (2011) Information Systems , vol.36 , pp. 675-705
    • Kim, W.1    Jeong, O.-R.2    Kim, C.3    So, J.4
  • 4
  • 5
    • 53049102892 scopus 로고    scopus 로고
    • Building network attack graph for alert causal correlation
    • S. Zhang, J. Li, X. Chen, and L. Fan, "Building network attack graph for alert causal correlation," Computers & Security, vol. 27, pp. 188-196, 2008.
    • (2008) Computers & Security , vol.27 , pp. 188-196
    • Zhang, S.1    Li, J.2    Chen, X.3    Fan, L.4
  • 6
    • 84863389870 scopus 로고    scopus 로고
    • Generation and Analysis of Attack Graphs
    • C. Wang, N. Du, and H. Yang, "Generation and Analysis of Attack Graphs," Procedia Engineering, vol. 29, pp. 4053-4057, 2012.
    • (2012) Procedia Engineering , vol.29 , pp. 4053-4057
    • Wang, C.1    Du, N.2    Yang, H.3
  • 7
    • 80955142736 scopus 로고    scopus 로고
    • Analysis of update delays in signature-based network intrusion detection systems
    • H. Gascon, A. Orfila, and J. Blasco, "Analysis of update delays in signature-based network intrusion detection systems," vol. 30, pp. 613-624, 2011.
    • (2011) , vol.30 , pp. 613-624
    • Gascon, H.1    Orfila, A.2    Blasco, J.3
  • 8
    • 84857364659 scopus 로고    scopus 로고
    • Performance of automated network vulnerability scanning at remediating security issues
    • H. Holm, "Performance of automated network vulnerability scanning at remediating security issues," Computers & Security, vol. 31, pp. 164-175, 2012.
    • (2012) Computers & Security , vol.31 , pp. 164-175
    • Holm, H.1
  • 9
    • 84868351615 scopus 로고    scopus 로고
    • Cracking Associative Passwords
    • A. Jøsang and B. Carlsson, Eds., ed: Springer Berlin Heidelberg
    • K. Helkala, N. Svendsen, P. Thorsheim, and A. Wiehe, "Cracking Associative Passwords," in Secure IT Systems. vol. 7617, A. Jøsang and B. Carlsson, Eds., ed: Springer Berlin Heidelberg, 2012, pp. 153-168.
    • (2012) Secure IT Systems , vol.7617 , pp. 153-168
    • Helkala, K.1    Svendsen, N.2    Thorsheim, P.3    Wiehe, A.4
  • 10
    • 61849175333 scopus 로고    scopus 로고
    • Efficient deterministic method for detecting new U2R attacks
    • R. Beghdad, "Efficient deterministic method for detecting new U2R attacks," Computer Communications, vol. 32, pp. 1104-1110, 2009.
    • (2009) Computer Communications , vol.32 , pp. 1104-1110
    • Beghdad, R.1
  • 12
    • 84861312719 scopus 로고    scopus 로고
    • Procedure for detection of and response to Distributed Denial of Service cyber attacks on complex enterprise systems
    • P. C. Hershey and C. B. Silio, "Procedure for detection of and response to Distributed Denial of Service cyber attacks on complex enterprise systems," in Systems Conference (SysCon), 2012 IEEE International, 2012, pp. 1-6.
    • (2012) Systems Conference (SysCon), 2012 IEEE International , pp. 1-6
    • Hershey, P.C.1    Silio, C.B.2
  • 15
    • 84888868336 scopus 로고    scopus 로고
    • Available
    • C. P. software. (2012). Riverbed® Cascade® Pilot software. Available:http://www.riverbed.com/us/products/cascade/cascade_pilot.php
    • (2012) Riverbed® Cascade® Pilot software


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.