메뉴 건너뛰기




Volumn 2, Issue , 2001, Pages 108-118

Protocol scrubbing: Network security through transparent flow modification

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; INTRUSION DETECTION; MERCURY (METAL); NETWORK PROTOCOLS; PASSIVE NETWORKS; SCRUBBERS; TRANSMISSION CONTROL PROTOCOL;

EID: 84964467096     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2001.932163     Document Type: Conference Paper
Times cited : (4)

References (25)
  • 8
    • 0028430224 scopus 로고
    • Network Intrusion Detection
    • May and June
    • B. Mukherjee, L. T. Heberlein, and K. N. Levitt. Network Intrusion Detection. IEEE Network, 8(3):26-41, May and June 1994.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 10
    • 0000579968 scopus 로고    scopus 로고
    • Automated Packet Trace Analysis of TCP Implementations
    • Cannes, France, September
    • V. Paxson. Automated Packet Trace Analysis of TCP Implementations. In Proceedings of ACM SIGCOMM '97, Cannes, France, September 1997.
    • (1997) Proceedings of ACM SIGCOMM '97
    • Paxson, V.1
  • 11
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • San Antonio, Texas, January
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 1998.
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Paxson, V.1
  • 13
    • 0033871228 scopus 로고    scopus 로고
    • The Phoenix Framework: A Practical Architecture for Programmable Networks
    • March
    • D. Putzolu, S. Bakshi, S. Yadav, and R. Yavatkar. The Phoenix Framework: A Practical Architecture for Programmable Networks. IEEE Communications, 38(3):160-165, March 2000.
    • (2000) IEEE Communications , vol.38 , Issue.3 , pp. 160-165
    • Putzolu, D.1    Bakshi, S.2    Yadav, S.3    Yavatkar, R.4
  • 14
    • 84964454852 scopus 로고    scopus 로고
    • Queso Homepage, http://www.apostols.org/projectz/queso/.
    • Queso Homepage
  • 17
    • 0030832833 scopus 로고    scopus 로고
    • Dummynet: A simple approach to the evaluation of network protocols
    • January
    • L. Rizzo. Dummynet: a simple approach to the evaluation of network protocols. ACM Computer Communication Review, January 1997.
    • (1997) ACM Computer Communication Review
    • Rizzo, L.1
  • 18
    • 84962297375 scopus 로고    scopus 로고
    • I. S. Services. RealSecure™. http://www.iss.net/prod/rs.html.
    • RealSecure™
  • 21
    • 0344523548 scopus 로고
    • The Protocols
    • Addison-Wesley
    • W. R. Stevens. TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994.
    • (1994) TCP/IP Illustrated , vol.1
    • Stevens, W.R.1
  • 22
    • 84890867432 scopus 로고    scopus 로고
    • T. I. Systems. TIS Firewall Toolkit, ftp://ftp.tis.com/pub/firewalls/toolkit.
    • TIS Firewall Toolkit
  • 24
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating Security Managers: A Peer-Based Intrusion Detection System
    • January and February
    • G. B. White, E. A. Fisch, and U. W. Pooch. Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network, 10(1):20-23, January and February 1996.
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.