메뉴 건너뛰기




Volumn , Issue , 2003, Pages 242-248

On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems

Author keywords

Character generation; Computer science; Force measurement; Intrusion detection; IP networks; Local area networks; Protocols; Telecommunication traffic; Testing; Traffic control

Indexed keywords

COMPUTER SCIENCE; FORCE MEASUREMENT; INSPECTION EQUIPMENT; INTERNET; INTERNET PROTOCOLS; LOCAL AREA NETWORKS; MERCURY (METAL); NETWORK PROTOCOLS; TELECOMMUNICATION TRAFFIC; TESTING; TRAFFIC CONTROL;

EID: 84943421730     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAINT.2003.1183056     Document Type: Conference Paper
Times cited : (21)

References (17)
  • 4
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in World Wide Web traffic: Evidence and possible causes
    • Dec
    • M. Crovella and A. Bestavros. Self-similarity in World Wide Web traffic: Evidence and possible causes. IEEE-ACM Transactions on Networking, 5(6), Dec 1997.
    • (1997) IEEE-ACM Transactions on Networking , vol.5 , Issue.6
    • Crovella, M.1    Bestavros, A.2
  • 5
    • 33644961664 scopus 로고    scopus 로고
    • 1999 DARPA intrusion detection evaluation: Design and procedures
    • Massachusetts Institute of Technology
    • J. Haines, R. Lippmann, D. Fried, et al. 1999 DARPA intrusion detection evaluation: Design and procedures. Lincoln Laboratory Technical Report 1062, Massachusetts Institute of Technology, 2001.
    • (2001) Lincoln Laboratory Technical Report
    • Haines, J.1    Lippmann, R.2    Fried, D.3
  • 8
  • 12
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • R. Lippmann, J. Haines, D. Fried, et al. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34, 2000.
    • (2000) Computer Networks , vol.34
    • Lippmann, R.1    Haines, J.2    Fried, D.3
  • 13
    • 0035402121 scopus 로고    scopus 로고
    • Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems
    • D. Nash and D. Ragsdale. Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 31(4), 2001.
    • (2001) IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans , vol.31 , Issue.4
    • Nash, D.1    Ragsdale, D.2
  • 14
    • 0033667059 scopus 로고    scopus 로고
    • Comparing local search with respect to genetic evolution to detect intrusions in computer networks
    • F. Neri. Comparing local search with respect to genetic evolution to detect intrusions in computer networks. In Proceedings, Congress on Evolutionary Computation, 2000.
    • Proceedings, Congress on Evolutionary Computation, 2000
    • Neri, F.1
  • 16
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of Poisson modeling
    • June
    • V. Paxson and S. Floyd. Wide-area traffic: The failure of Poisson modeling. IEEE-ACM Transactions on Networking, 3(3), June 1995.
    • (1995) IEEE-ACM Transactions on Networking , vol.3 , Issue.3
    • Paxson, V.1    Floyd, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.