메뉴 건너뛰기




Volumn , Issue , 2020, Pages 15-28

Role classification of hosts within enterprise networks based on connection patterns

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCIAL NETWORKS; CONNECTION PATTERNS; ENTERPRISE NETWORKS; LOGICAL STRUCTURE; NETWORK MONITORING; NETWORK SEGMENTATION; ORDERS OF MAGNITUDE;

EID: 85077580912     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (28)

References (28)
  • 3
    • 0042536297 scopus 로고    scopus 로고
    • September
    • CERT COORDINATION CENTER. CERT Advisory CA-2001-26: Nimda Worm. http://www.cert.org/advisories/CA-2001-26.html, September 2001.
    • (2001) CERT Advisory CA-2001-26: Nimda Worm
  • 6
    • 56449096542 scopus 로고    scopus 로고
    • CISCO SYSTEMS. Cisco IOS NetFlow. http://cisco.com/warp/public/732/netflow.
    • Cisco IOS NetFlow
  • 7
    • 85080336006 scopus 로고    scopus 로고
    • CISCO SYSTEMS. Dynamic VLANs. http://cisco.com/univercd/cc/td/doc/product/ lan/cat5000/rel_5_2/config/vmps.htm.
    • Dynamic VLANs
  • 8
    • 85080355160 scopus 로고    scopus 로고
    • COMPUTER ASSOCIATES INTERNATIONAL. Unicenter. http://cai.com/unicenter.
    • Unicenter
  • 15
    • 85080414689 scopus 로고    scopus 로고
    • HEWLETT-PACKARD COMPANY. OpenView. http://openview.hp.com.
    • OpenView
  • 17
    • 77952651347 scopus 로고    scopus 로고
    • INTERNATIONAL BUSINESS MACHINES. Tivoli Software. http://tivoli.com.
    • Tivoli Software
  • 22
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May-June
    • MUKHERJEE, B., HEBERLEIN, L., AND LEVITT, K. Network intrusion detection. IEEE Network 8, 3 (May-June 1994), 26-41.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.2    Levitt, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.