Scalable Double Filter Structure for Port Scan Detection
暂无分享,去创建一个
Tao He | Xing Li | Changqing An | Shijin Kong | Xiaoxin Shao | Tao He | Xing Li | Shijin Kong | Xiaoxin Shao | Changqing An
[1] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[2] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[3] Cheng Guang. A Hash Algorithm for IP Flow Measurement , 2005 .
[4] Robert K. Cunningham,et al. A taxonomy of computer worms , 2003, WORM '03.
[5] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[6] George Varghese,et al. New directions in traffic measurement and accounting , 2002, CCRV.
[7] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[9] George Varghese,et al. On the difficulty of scalably detecting network attacks , 2004, CCS '04.
[10] Kotagiri Ramamohanarao,et al. A probabilistic approach to detecting network scans , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).