메뉴 건너뛰기




Volumn 20, Issue 6, 2004, Pages 1079-1091

Abnormal event detection for network flooding attacks

Author keywords

Abnormal traffic event detection; Event correlation; Network flooding attacks; Network security management; Statistical reference window

Indexed keywords

EMBEDDED SYSTEMS; MATHEMATICAL MODELS; MONITORING; PARAMETER ESTIMATION; PATTERN MATCHING; PROBABILITY; ROUTERS; TELECOMMUNICATION TRAFFIC; WORLD WIDE WEB;

EID: 9944222821     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (17)
  • 1
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • A. Chakrabarti and G. Manimaran, "Internet infrastructure security: a taxonomy," IEEE Network, Vol. 16, 2002, pp. 13-21.
    • (2002) IEEE Network , vol.16 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 2
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • J. McHugh, A. Christie, and J. Alien, "Defending yourself: the role of intrusion detection systems," IEEE Software, 2000, pp. 42-46.
    • (2000) IEEE Software , pp. 42-46
    • McHugh, J.1    Christie, A.2    Alien, J.3
  • 3
    • 1542350966 scopus 로고    scopus 로고
    • Fast content-based packet handling for intrusion detection
    • M. Fisk and G. Varghese, "Fast content-based packet handling for intrusion detection," UCSD Technical Report CS2001-0670, 2001.
    • (2001) UCSD Technical Report , vol.CS2001-0670
    • Fisk, M.1    Varghese, G.2
  • 6
    • 0025505472 scopus 로고
    • A case study of Ethernet anomalies in a distributed computing environment
    • R. A. Maxion and F. E. Feather, "A case study of Ethernet anomalies in a distributed computing environment," IEEE Transactions on Reliability, Vol. 39, 1990, pp. 433-443.
    • (1990) IEEE Transactions on Reliability , vol.39 , pp. 433-443
    • Maxion, R.A.1    Feather, F.E.2
  • 7
    • 0031351694 scopus 로고    scopus 로고
    • Proactive network fault detection
    • C. S. Hood and C. Ji, "Proactive network fault detection," in Proceedings of INFOCOM '97, Vol. 3, 1997, pp. 1147-1155.
    • (1997) Proceedings of INFOCOM '97 , vol.3 , pp. 1147-1155
    • Hood, C.S.1    Ji, C.2
  • 11
    • 51149105210 scopus 로고    scopus 로고
    • Proactive detection of distributed denial of service attacks using MIB traffic variables - A feasibility study
    • J. B. D. Cabrera et al., "Proactive detection of distributed denial of service attacks using MIB traffic variables - a feasibility study," in Proceedings of 2001 IEEE/IFIP Integrated Network Management, 2001, pp. 609-622.
    • (2001) Proceedings of 2001 IEEE/IFIP Integrated Network Management , pp. 609-622
    • Cabrera, J.B.D.1
  • 12
    • 0031337396 scopus 로고    scopus 로고
    • Beyond thresholds: An alternative method for extracting information from network measurements
    • C. S. Hood and C. Ji, "Beyond thresholds: an alternative method for extracting information from network measurements," in Proceedings of 1997 IEEE Global Telecommunications Conference, Vol. 1, 1997, pp. 487-491.
    • (1997) Proceedings of 1997 IEEE Global Telecommunications Conference , vol.1 , pp. 487-491
    • Hood, C.S.1    Ji, C.2
  • 17
    • 0003958799 scopus 로고    scopus 로고
    • Internet traffic tends to poisson and independent as the load increases
    • J. Cao et al., "Internet traffic tends to poisson and independent as the load increases," Bell Labs Technical Report, 2001.
    • (2001) Bell Labs Technical Report
    • Cao, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.