Limitations to threshold random walk scan detection and mitigating enhancements
暂无分享,去创建一个
[1] T. Lai. SEQUENTIAL ANALYSIS: SOME CLASSICAL PROBLEMS AND NEW CHALLENGES , 2001 .
[2] Fang Liu,et al. Research for scan detection algorithm of high-speed links based on honeypot , 2010, 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content.
[3] Michel Cukier,et al. An experimental evaluation to determine if port scans are precursors to an attack , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[4] Xinjia Chen. New Sequential Methods for Detecting Portscanners , 2012, ArXiv.
[5] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[6] Jugal K. Kalita,et al. Surveying Port Scans and Their Detection Methodologies , 2011, Comput. J..
[7] Fabio Ricciato,et al. Detecting Scanners: Empirical Assessment on a 3G Network , 2009, Int. J. Netw. Secur..
[8] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[9] Tao Ye,et al. Connectionless port scan detection on the backbone , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[10] Roberto Baldoni,et al. Inter-domain stealthy port scan detection through complex event processing , 2011, EWDC '11.