Context-aware network security

作者: Sushant Sinha

DOI:

关键词:

摘要:

参考文章(47)
Sushant Sinha, Michael Bailey, Farnam Jahanian, None, Shedding Light on the Configuration of Dark Addresses. network and distributed system security symposium. ,(2007)
Xuxian Jiang, Dongyan Xu, Collapsar: a VM-based architecture for network attack detention center usenix security symposium. pp. 2- 2 ,(2004)
William G. Cochran, Sampling Techniques, 3Rd Edition ,(1963)
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Fast and Evasive Attacks: Highlighting the Challenges Ahead Lecture Notes in Computer Science. pp. 206- 225 ,(2006) , 10.1007/11856214_11
David V. Schuehler, John W. Lockwood, A Modular System for FPGA-Based TCP Flow Processing in High-Speed Networks field-programmable logic and applications. pp. 301- 310 ,(2004) , 10.1007/978-3-540-30117-2_32
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
Mary Vernon, Jason Franklin, John Bethencourt, Mapping internet sensors with probe response attacks usenix security symposium. pp. 13- 13 ,(2005)
Vinod Yegneswaran, Paul Barford, Dave Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring recent advances in intrusion detection. pp. 146- 165 ,(2004) , 10.1007/978-3-540-30143-1_8