메뉴 건너뛰기




Volumn , Issue , 2017, Pages 175-177

An adaptive algorithm for detecting and preventing attacks in telecommunication networks

Author keywords

attacks; Intrusion Detection Systems; Intrusion Prevention Systems; Threats; vulnerability

Indexed keywords

ADAPTIVE ALGORITHMS; MERCURY (METAL); NETWORK SECURITY; RISK ASSESSMENT;

EID: 85018377041     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOMMST.2016.7905373     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 2
    • 0024621174 scopus 로고
    • On estimation of entropy and mutual information of continuous distributions
    • R. Moddemeijer. "On estimation of entropy and mutual information of continuous distributions." Signal Processing, vol.16, no.3, pp. 233-246, 1989.
    • (1989) Signal Processing , vol.16 , Issue.3 , pp. 233-246
    • Moddemeijer, R.1
  • 4
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues and open problems
    • J. Raymond. "Traffic analysis: Protocols, attacks, design issues and open problems." Designing Privacy Enhancing Technologies (LNCS), vol.2009, pp. 10-29, 2001.
    • (2001) Designing Privacy Enhancing Technologies (LNCS) , vol.2009 , pp. 10-29
    • Raymond, J.1
  • 11
    • 72849153369 scopus 로고    scopus 로고
    • Combining multiple intrusion detection and response technologies in an active networking based architecture
    • A. Hess, M. Jung, and G. Schafer, "Combining multiple intrusion detection and response technologies in an active networking based architecture," DFN-Arbeitstagung uber Kommunikationsnetze, pp. 153-165, 2003.
    • (2003) DFN-Arbeitstagung Uber Kommunikationsnetze , pp. 153-165
    • Hess, A.1    Jung, M.2    Schafer, G.3
  • 13
    • 33947692292 scopus 로고    scopus 로고
    • Analysis of active intrusion prevention data for predicting hostile activity in computer networks
    • I. Green, T. Raz, and M. Zviran, "Analysis of active intrusion prevention data for predicting hostile activity in computer networks," Communications of the ACM, vol. 50, pp. 63-68, 2007.
    • (2007) Communications of the ACM , vol.50 , pp. 63-68
    • Green, I.1    Raz, T.2    Zviran, M.3
  • 17
    • 49949086459 scopus 로고    scopus 로고
    • Refacing: An autonomic approach to network security based on multidimensional trustworthiness
    • F. Oliviero, L. Peluso, and S. Romano, "Refacing: An autonomic approach to network security based on multidimensional trustworthiness," Computer Networks, vol. 52, no. 14, pp. 2745-2763, 2008.
    • (2008) Computer Networks , vol.52 , Issue.14 , pp. 2745-2763
    • Oliviero, F.1    Peluso, L.2    Romano, S.3
  • 20
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: a system for detecting network intruders in real-time," Computer Networks, vol. 31, pp. 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.