메뉴 건너뛰기




Volumn , Issue , 2006, Pages 493-522

Anomaly-based self protection against network attacks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84962702813     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (11)

References (69)
  • 1
    • 0034721164 scopus 로고    scopus 로고
    • The Internet’s Achilles’ heel: Error and attack tolerance of complex networks
    • R. Albert, H. Jeong., and A-L. Barabási, “The Internet’s Achilles’ heel: error and attack tolerance of complex networks,” Nature 406 378, 2000.
    • (2000) Nature , vol.406 , pp. 378
    • Albert, R.1    Jeong, H.2    Barabási, A.-L.3
  • 4
    • 0004194675 scopus 로고    scopus 로고
    • Internet Draft: draft-bellovin-itrace- 00.txt, March
    • S.M. Bellovin, “ICMP Traceback Message,” Internet Draft: draft-bellovin-itrace- 00.txt, March 2000.
    • (2000) ICMP Traceback Message
    • Bellovin, S.M.1
  • 7
    • 85055938489 scopus 로고    scopus 로고
    • CERT Advisory CA-2003-04 MS-SQL Serve Worm, January
    • CERT, “CERT Advisory CA-2003-04 MS-SQL Serve Worm,” http://www.cert.org/advisories/CA-2003-04.html, January 2003.
    • (2003)
  • 8
    • 85055948710 scopus 로고    scopus 로고
    • Cisco netflow, http://www.cisco.com/en/u/products/ps6601/products_ios_protocol_group_home.html.
  • 9
    • 34250211085 scopus 로고    scopus 로고
    • February
    • CNN. “Cyber-attacks batter web heavyweights,” http://archives.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/, February 2000.
    • (2000) Cyber-Attacks Batter Web Heavyweights
  • 10
    • 4544346801 scopus 로고    scopus 로고
    • February
    • CNN. “Immense network assault takes down yahoo,” http://archives.cnn.com/2000/TECH/computing/02/08/yahoo.assault.idg/, February 2000.
    • (2000) Immense Network Assault Takes down Yahoo
  • 11
  • 13
    • 85055954922 scopus 로고    scopus 로고
    • IDIOT — Users Guide, Technical Report TR-96-050, Purdue University, COAST Laboratory, September
    • M. Crosbie, B. Dole, T. Ellis, I. Krsul, and E. Spafford, IDIOT — Users Guide, Technical Report TR-96-050, Purdue University, COAST Laboratory, September 1996.
    • (1996)
    • Crosbie, M.1    Dole, B.2    Ellis, T.3    Krsul, I.4    Spafford, E.5
  • 14
    • 85055937746 scopus 로고    scopus 로고
    • DARPA KDD99
    • DARPA KDD99, http://kdd.ics.uci.edu/databases/kddcup/task.html, 2005.
    • (2005)
  • 16
    • 0012473383 scopus 로고
    • Recent Progress in Distance and Similarity Measures in Pattern Recognition
    • E. Diday, “Recent Progress in Distance and Similarity Measures in Pattern Recognition.” Second International Joint Conference on Pattern Recognition, pp. 534–539, 1974.
    • (1974) Second International Joint Conference on Pattern Recognition , pp. 534-539
    • Diday, E.1
  • 22
    • 4544270125 scopus 로고    scopus 로고
    • Impact Analysis of Faults and Attacks in Large-Scale Networks
    • September/October
    • S. Hariri, G. Qu, T. Dharmagadda, and R. Modukuri, “Impact Analysis of Faults and Attacks in Large-Scale Networks,” IEEE Security and Privacy, September/October 2003 Vol. 1, No. 5.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.5
    • Hariri, S.1    Qu, G.2    Dharmagadda, T.3    Modukuri, R.4
  • 23
    • 0027593257 scopus 로고
    • Nadir: An automated system for detecting network intrusion and misuse
    • J. Hochberg, et al., Nadir: An automated system for detecting network intrusion and misuse. Computers & Security, 12(23.3):235-248, 1993.
    • (1993) Computers & Security , vol.12 , Issue.23 , pp. 235-248
    • Hochberg, J.1
  • 26
    • 85180745018 scopus 로고    scopus 로고
    • Implementing Pushback: Router-Based Defense Against DDoS Attacks
    • San Diego, CA, February
    • J. Ioannidis and S.M. Bellovin, “Implementing Pushback: Router-Based Defense Against DDoS Attacks,” Proceedings of NDSS’2002, San Diego, CA, February 2002.
    • (2002) Proceedings of NDSS’2002
    • Ioannidis, J.1    Bellovin, S.M.2
  • 27
    • 0035359901 scopus 로고    scopus 로고
    • Automatic feature extraction of waveform signals for in-process diagnostic performance improvement
    • J. Jin and J. Shi, “Automatic feature extraction of waveform signals for in-process diagnostic performance improvement,” Journal of Intelligent Manufacturing 12, 257–268, 2001.
    • (2001) Journal of Intelligent Manufacturing , vol.12 , pp. 257-268
    • Jin, J.1    Shi, J.2
  • 28
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion Detection: A Brief History and Overview
    • R. Kemmerer and G. Vigna. “Intrusion Detection: A Brief History and Overview,” IEEE Computer 27–30, 2002.
    • (2002) IEEE Computer , pp. 27-30
    • Kemmerer, R.1    Vigna, G.2
  • 35
    • 85055919393 scopus 로고    scopus 로고
    • Slammer worm
    • Matrix, “Slammer worm.” Retrieved April 20, 2003, from http://www.matrixnetsystems.com/ea/2003/20030130.jsp.
    • (2003)
  • 36
    • 0002096383 scopus 로고
    • A Recent Advance in Data Analysis: Clustering Objects into Classes Characterized by Conjunctive Concepts
    • Laveen N. Kanal and Azriel Rosenfeld (Eds.). New York: North-Holland
    • R.S. Michalski, R. E. Stepp, and E. Diday, “A Recent Advance in Data Analysis: Clustering Objects into Classes Characterized by Conjunctive Concepts,” Progress in Pattern Recognition, Vol. 1, Laveen N. Kanal and Azriel Rosenfeld (Eds.). New York: North-Holland, pp. 33–56, 1981.
    • (1981) Progress in Pattern Recognition , vol.1 , pp. 33-56
    • Michalski, R.S.1    Stepp, R.E.2    Diday, E.3
  • 41
    • 85055924016 scopus 로고    scopus 로고
    • Committee on the Internet under Crisis Conditions: Learning from the Impact of September 11,” The National Academies Press
    • National Research Council, “Committee on the Internet under Crisis Conditions: Learning from the Impact of September 11,” The National Academies Press, 2003. Retrieved from http://www.nap.edu/books/0309087023/html/.
    • (2003)
  • 43
    • 85055948885 scopus 로고    scopus 로고
    • A Report on Internet Worm
    • B. Page, “A Report on Internet Worm,” http://www.ee.ryerson.ca/∼elf/hack/iworm.html.
    • Page, B.1
  • 44
    • 0034776786 scopus 로고    scopus 로고
    • On the Effectiveness of Route-Based Packet Filtering for DDoS Attack Prevention in Power-Low Internets
    • San Diego, CA, August, ACM
    • K. Park and H. Lee. “On the Effectiveness of Route-Based Packet Filtering for DDoS Attack Prevention in Power-Low Internets.” In Proceedings of the ACM SIGCOMM, pages 15–26, San Diego, CA, August 2001. ACM.
    • (2001) Proceedings of the ACM SIGCOMM , pp. 15-26
    • Park, K.1    Lee, H.2
  • 46
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • July
    • V. Paxson. “An analysis of using reflectors for distributed denial-of-service attacks,” Computer Communication Review 31(23.3), July 2001.
    • (2001) Computer Communication Review , vol.31 , Issue.23
    • Paxson, V.1
  • 47
    • 0002989559 scopus 로고    scopus 로고
    • End-to-End Internet Packet Dynamics
    • September
    • V. Paxson, “End-to-End Internet Packet Dynamics,” Proc., SIGCOMM’97, September 1997.
    • (1997) Proc., SIGCOMM’97
    • Paxson, V.1
  • 50
    • 4544337929 scopus 로고    scopus 로고
    • Online Monitoring and Analysis for Self Protection against Network attacks
    • ICAC, New York, NY
    • G. Qu, S. Hariri, et al., “Online Monitoring and Analysis for Self Protection against Network attacks,” International Conference on Autonomic Computing (ICAC 2004), New York, NY.
    • (2004) International Conference on Autonomic Computing
    • Qu, G.1    Hariri, S.2
  • 51
    • 85055957403 scopus 로고    scopus 로고
    • Multivariate Statistical Online Analysis for Self Protection against Network Attacks
    • G. Qu, S. Hariri, X. Zhu, J. Jin, and Y. Mazin, “Multivariate Statistical Online Analysis for Self Protection against Network Attacks,” AICSSA’05.
    • AICSSA’05
    • Qu, G.1    Hariri, S.2    Zhu, X.3    Jin, J.4    Mazin, Y.5
  • 52
    • 27644496932 scopus 로고    scopus 로고
    • A New Dependency and Correlation Analysis for Features
    • Special Issue on Intelligent Data Preparation, September
    • G. Qu, S. Hariri, and Y. Mazin, “A New Dependency and Correlation Analysis for Features,” IEEE Transactions on Knowledge and Data Engineering, Special Issue on Intelligent Data Preparation, September, 2005.
    • (2005) IEEE Transactions on Knowledge and Data Engineering
    • Qu, G.1    Hariri, S.2    Mazin, Y.3
  • 53
    • 85055923862 scopus 로고    scopus 로고
    • Report to the President’s Commission on Critical Infrastructure Protection
    • Threat and Vulnerability Model for Information Security. Report to the President’s Commission on Critical Infrastructure Protection 1997.
    • (1997)
  • 54
    • 0005720914 scopus 로고
    • Misuse detection tools
    • Spring
    • S.E. Smaha and J. Winslow, “Misuse detection tools,” Computer Security Journal 10, 1, Spring, 1994, pp. 39–49.
    • (1994) Computer Security Journal , vol.10 , Issue.1 , pp. 39-49
    • Smaha, S.E.1    Winslow, J.2
  • 58
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and Authenticated Marking Schemes for IP Traceback
    • March
    • D. Song and A. Perrig, “Advanced and Authenticated Marking Schemes for IP Traceback,” In Proceedings of ACM SIGCOMM’2001, March 2001.
    • (2001) Proceedings of ACM SIGCOMM’2001
    • Song, D.1    Perrig, A.2
  • 60
    • 0003507850 scopus 로고    scopus 로고
    • 2nd edition, Upper Saddle River: Prentice-Hall
    • W. Stallings, “Network Security Essentials” 2nd edition, Upper Saddle River: Prentice-Hall, 2003.
    • (2003) Network Security Essentials
    • Stallings, W.1
  • 61
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP Overlay Network for Tracking DoS Floods
    • Denver, Colorado, August
    • R. Stone, “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” Proceedings of 9th USENIX Security Symposium, Denver, Colorado, August 2000.
    • (2000) Proceedings of 9Th USENIX Security Symposium
    • Stone, R.1
  • 62
    • 85055923490 scopus 로고    scopus 로고
    • Sandia National Laboratories. F. Tsung and J. Shi, (1999), “Integration of Run-to-Run PID Controller and SPC for Process Disturbance Rejection,” IIE Transactions
    • L.P. Swiler, C. Phillips, and T. Gaylor, (1998), “A Graph-Based Network- Vulnerability Analysis System.” Sandia National Laboratories. F. Tsung and J. Shi, (1999), “Integration of Run-to-Run PID Controller and SPC for Process Disturbance Rejection,” IIE Transactions, Vol. 31, pp. 517–527.
    • (1998) A Graph-Based Network- Vulnerability Analysis System , vol.31 , pp. 517-527
    • Swiler, L.P.1    Phillips, C.2    Gaylor, T.3
  • 63
    • 85055930511 scopus 로고    scopus 로고
    • INBOUNDS: The Integrated Network-Based Ohio University Network Detective Service
    • B. Tjaden, et al, (2004) INBOUNDS: The Integrated Network-Based Ohio University Network Detective Service, retrieved from http://www.mts.jhu.edu/∼marchette/ID04/Papers/SCI2000.pdf
    • (2004)
    • Tjaden, B.1
  • 64
    • 85055918860 scopus 로고    scopus 로고
    • Retrieved on April
    • “DoS Attack,” Retrieved on April, 2004 from http://www.webopedia.com/TERM/D/DoS_attack.html.
    • (2004)
  • 65
    • 0038404196 scopus 로고    scopus 로고
    • Defending Against Distributed Denial-of-Service Attacks with Max-min Fair Server-centric Router Throttles
    • Miami Beach, FL, May
    • D. Yau, J. Liu, and F. Liang, “Defending Against Distributed Denial-of-Service Attacks with Max-min Fair Server-centric Router Throttles,” Proceedings of IWQoS’2002, Miami Beach, FL, May 2002.
    • (2002) Proceedings of IWQoS’2002
    • Yau, D.1    Liu, J.2    Liang, F.3
  • 67
    • 0035271352 scopus 로고    scopus 로고
    • An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems
    • N. Ye and Q. Chen, “An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems,” Quality and Reliability Engineering Journal, vol. 17, p. 105–112, 2001.
    • (2001) Quality and Reliability Engineering Journal , vol.17 , pp. 105-112
    • Ye, N.1    Chen, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.