Integrating grid with intrusion detection
暂无分享,去创建一个
Chao-Tung Yang | Fang-Yie Leu | Po-Chi Shih | Jia-Chun Lin | Ming-Chang Li | Chao-Tung Yang | Jia-Chun Lin | Fang-Yie Leu | Po-Chi Shih | Ming-Chang Li
[1] Ami Marowka,et al. The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..
[2] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[3] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[4] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[5] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[6] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[7] Rocky K. C. Chang,et al. Engineering of a global defense infrastructure for DDoS attacks , 2002, Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588).
[8] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.