Identifying Reconnaissance Activity: A Strategy for Network Defence

作者: JS Hartnett , JD Scanlan , RN Williams

DOI:

关键词:

摘要: Over recent years there has been a massive increase in the need to build stronger and more effective defensive systems many contexts due amplified threat of terrorism. Network security is no exception this increased secure against attack. One area within network which received heightened interest correlation reconnaissance activities, rather than merely blocking source addresses without further investigation. This paper will examine work date detail how various researchers have approached scan activity, relation detection overt malicious activity or mapping. The that built contain two key components for examination: engine method by data collected some cases transported across host network. After summary existing research then new we are undertaking field, using clustering techniques conjunction with peer network, correlate port real-time.

参考文章(6)
Bambang Sukirno, Abdul Aziz, Aku melawan teroris Jazeera. ,(2004)
Kevin D. Mitnick, William L. Simon, The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers John Wiley & Sons, Inc.. ,(2005)
Douglas H. Fisher, Knowledge acquisition via incremental conceptual clustering Machine Learning. ,vol. 2, pp. 139- 172 ,(1987) , 10.1023/A:1022852608280