The Optimization Of Stepping Stone Detection: Packet Capturing Steps
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. Using embedded sensors for detecting network attacks , 2000 .
[2] Steven McCanne,et al. The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.
[3] Isij Monitor,et al. Network Intrusion Detection: An Analyst’s Handbook , 2000 .
[4] Hiroaki Etoh,et al. Finding a Connection Chain for Tracing Intruders , 2000, ESORICS.
[5] Fred Cohen,et al. Simulating cyber attacks, defences, and consequences , 1999, Comput. Secur..
[6] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[7] Stuart Staniford-Chen,et al. Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[8] Jeffrey C. Mogul,et al. The packer filter: an efficient mechanism for user-level network code , 1987, SOSP '87.
[9] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[10] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[11] Fulvio Risso,et al. An architecture for high performance network analysis , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.
[12] Subariah Ibrahim,et al. Towards Solving Time Gap Problems through the Optimization of Packet Capture Technique , 2003, CITA.
[13] Sang Lyul Min,et al. Caller Identification System in the Internet Environment , 1993 .
[14] Douglas S. Reeves,et al. Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones , 2002, ESORICS.
[15] George Varghese,et al. Intrusion Response Systems: A Survey , 2008 .
[16] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[17] Duane C. Hanselman,et al. Mastering MATLAB 5: A Comprehensive Tutorial and Reference , 1995 .
[18] Sangwook Kim,et al. A self-extension monitoring for security management , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[19] Vern Paxson,et al. Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.
[20] Udo W. Pooch,et al. Adaptation techniques for intrusion detection and intrusion response systems , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[21] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[22] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems 1 , 1996 .