메뉴 건너뛰기




Volumn Part F129303, Issue , 1998, Pages 94-106

Protecting routing infrastructures from denial of service using cooperative intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET PROTOCOLS; INTRUSION DETECTION; NETWORK SECURITY; ROUTERS;

EID: 85008056769     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/283699.283744     Document Type: Conference Paper
Times cited : (24)

References (20)
  • 2
    • 0027610755 scopus 로고
    • The consensus problem in fault-tolerant computing
    • June
    • M. Barborak, M. Malek, and A. Dahbura, "The Consensus Problem in Fault-Tolerant Computing." ACM Computing Surveys, Vol. 25, No. 2, June 1993, pp. 171-220.
    • (1993) ACM Computing Surveys , vol.25 , Issue.2 , pp. 171-220
    • Barborak, M.1    Malek, M.2    Dahbura, A.3
  • 4
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • D. Denning, "An Intrusion-Detection Model." IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, Feb. 1987, pp. 222-232.
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 5
    • 77950564085 scopus 로고
    • Reducing the vulnerability of dynamic computer networks
    • University of Southern California, June
    • G. G. Finn, "Reducing the Vulnerability of Dynamic Computer Networks", ISI Research Report RR-88-201, University of Southern California, June 1988.
    • (1988) ISI Research Report
    • Finn, G.G.1
  • 6
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach." IEEE Transactions on Software Engineering, Vol. 21, No. 3, March 1995, pp. 181-199.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 8
    • 0041296839 scopus 로고
    • Integrating security in inter-domain routing protocols
    • Oct.
    • B. Kumar, and J. Crowcroft, "Integrating Security in Inter-domain Routing Protocols." Computer Communication Review, Oct. 1993, Vol. 23, No. 5, pp. 36-51.
    • (1993) Computer Communication Review , vol.23 , Issue.5 , pp. 36-51
    • Kumar, B.1    Crowcroft, J.2
  • 9
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • June
    • T. F. Lunt, "A Survey of Intrusion Detection Techniques." Computer and Security, June 1993, Vol. 12, No. 4, pp. 405-418.
    • (1993) Computer and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 13
    • 0003151687 scopus 로고
    • Link-state routing
    • M. Steenstrup, ed., Prentice Hall
    • J. Moy, "Link-State Routing", in M. Steenstrup, ed., Routing in Communications Networks, Prentice Hall, 1995, pp. 135-157.
    • (1995) Routing in Communications Networks , pp. 135-157
    • Moy, J.1
  • 15
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May-June
    • B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network Intrusion Detection. " IEEE Network, May-June 1994, Vol. 8, No. 3, pp. 26-41.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 19
    • 84938017623 scopus 로고
    • On the connection assignment problem of diagnosable systems
    • Dec.
    • F. P. Preparata, G. Metze, and R. T. Chien, "On the Connection Assignment Problem of Diagnosable Systems." IEEE Transactions on Electronic Computers, Vol. EC-16, No. 6, Dec. 1967, pp. 848-854.
    • (1967) IEEE Transactions on Electronic Computers , vol.EC-16 , Issue.6 , pp. 848-854
    • Preparata, F.P.1    Metze, G.2    Chien, R.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.