메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Coordinated Scan Detection

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARY MODELING; COORDINATED ACTIVITY; COORDINATED ATTACK; DETECTION ALGORITHM; GAIN INFORMATION; INFORMATION GAIN; INFORMATION SPACES; MULTIPLE SOURCE; PORT SCANS; SET COVERING PROBLEM;

EID: 85180625485     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (29)
  • 1
    • 0000501656 scopus 로고
    • Information theory as an extension of the maximum likelihood principle
    • B. N. Petrov and F. Csaksi, editors, pages Budapest, Hungary
    • H. Akaike. Information theory as an extension of the maximum likelihood principle. In B. N. Petrov and F. Csaksi, editors, Proceedings of the 2nd International Symposium on Information Theory, pages 267 – 281, Budapest, Hungary, 1973.
    • (1973) Proceedings of the 2nd International Symposium on Information Theory , pp. 267-281
    • Akaike, H.1
  • 2
    • 85180632702 scopus 로고    scopus 로고
    • D. R. (Anthraxx) and B. P. (Kolrabi). Last visited: 2 July 2002
    • D. R. (Anthraxx) and B. P. (Kolrabi). DScan software. http://www.u-n-f.com/dscan.html, 2002. Last visited: 2 July 2002.
    • (2002) DScan software
  • 5
    • 33749522191 scopus 로고    scopus 로고
    • Attacking information visualization system usability overloading and deceiving the human
    • Pittsburgh, PA, USA, July
    • G. Conti, M. Ahamad, and J. Stasko. Attacking information visualization system usability overloading and deceiving the human. In Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, July 2005.
    • (2005) Symposium on Usable Privacy and Security
    • Conti, G.1    Ahamad, M.2    Stasko, J.3
  • 6
    • 8644229619 scopus 로고    scopus 로고
    • The art of port scanning
    • Fyodor. The art of port scanning. Phrack Magazine, 7(51), 1997.
    • (1997) Phrack Magazine , vol.7 , Issue.51
    • Fyodor1
  • 11
    • 0031199150 scopus 로고    scopus 로고
    • Computational experience with approximation algorithms for the set covering problem
    • T. Grossman and A. Wool. Computational experience with approximation algorithms for the set covering problem. European Journal of Operational Research, 101(1):81 – 92, 1997.
    • (1997) European Journal of Operational Research , vol.101 , Issue.1 , pp. 81-92
    • Grossman, T.1    Wool, A.2
  • 12
    • 84872777701 scopus 로고    scopus 로고
    • Distributed information gathering
    • hybrid
    • hybrid. Distributed information gathering. Phrack Magazine, 9(55), 1999.
    • (1999) Phrack Magazine , vol.9 , Issue.55
  • 16
    • 85180636555 scopus 로고    scopus 로고
    • Last visited: 12 December 2008
    • R. E. Lee. Unicornscan. http://www.unicornscan.org/, 2007. Last visited: 12 December 2008.
    • (2007) Unicornscan
    • Lee, R. E.1
  • 17
    • 85180633305 scopus 로고    scopus 로고
    • Last Visited: 9 November 2004
    • Mixter. Network security analysis tools. http://nsat.sourceforge.net/, 2003. Last Visited: 9 November 2004.
    • (2003) Network security analysis tools
  • 18
    • 84866808576 scopus 로고    scopus 로고
    • C. X. Naval Surface Warfare Center, Dahlgren Division. Last visited: 23 March 2002
    • C. X. Naval Surface Warfare Center, Dahlgren Division. Shadow indications technical analysis: Coordinated attacks and probes. http://www.nswc.navy.mil/ISSEC/CID/co-ordinated_analysis.txt, 1998. Last visited: 23 March 2002.
    • (1998) Shadow indications technical analysis: Coordinated attacks and probes
  • 21
    • 85180624054 scopus 로고    scopus 로고
    • Powerpoint presentation on The Intrusion Correlation Engine from an ACM conference. Last visited: 13 January 2003
    • S. Staniford. Intrusion correlation engine. http://www.silicondefense.com/research/ACM-tutorial-11-4-01.ppt, 2001. Powerpoint presentation on The Intrusion Correlation Engine from an ACM conference. Last visited: 13 January 2003.
    • (2001) Intrusion correlation engine
    • Staniford, S.1
  • 23
    • 85084162258 scopus 로고    scopus 로고
    • How to 0wn the Internet in your spare time
    • San Francisco, California, USA, August USENIX Association
    • S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, pages 149 – 167, San Francisco, California, USA, August 2002. USENIX Association.
    • (2002) Proceedings of the 11th USENIX Security Symposium , pp. 149-167
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 26
    • 33746440268 scopus 로고    scopus 로고
    • University of Southern California Information Sciences Institute. Last Visited: 9 November 2004
    • University of Southern California Information Sciences Institute. The DETER testbed: Overview. http://www.isi.edu/deter/docs/testbed.overview.pdf, 2004. Last Visited: 9 November 2004.
    • (2004) The DETER testbed: Overview


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.