Hardware Supports for Network Traffic Anomaly Detection.

作者: Jintae Oh , Dae-Won Kim

DOI:

关键词: Computer scienceComputer networkReal-time computingAnomaly detectionNetwork traffic control

摘要:

参考文章(16)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Vern Paxson, Stuart Staniford, Nicholas Weaver, Stefan Savage, Colleen Shannon, David Moore, The Spread of the Sapphire/Slammer Worm ,(2003)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger, Fast Detection of Scanning Worm Infections recent advances in intrusion detection. pp. 59- 81 ,(2004) , 10.1007/978-3-540-30143-1_4
James Moscola, Matthew Kulig, John W. Lockwood, Tim Brooks, David Reddick, Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware ,(2003)
Vinod Yegneswaran, Paul Barford, Somesh Jha, Global Intrusion Detection in the DOMINO Overlay System. network and distributed system security symposium. ,(2004)
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms international conference on computer communications. ,vol. 3, pp. 1890- 1900 ,(2003) , 10.1109/INFCOM.2003.1209211
Jelena Mirkovic, Peter Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms acm special interest group on data communication. ,vol. 34, pp. 39- 53 ,(2004) , 10.1145/997150.997156
Bernardo Alarcos, Marifeli Sedano, Maria Calderon, Multidomain Network Based on Programmable Networks: Security Architecture Etri Journal. ,vol. 27, pp. 651- 665 ,(2005) , 10.4218/ETRIJ.05.0105.0058