A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors
暂无分享,去创建一个
[1] Zhuoqing Morley Mao,et al. Characterizing Dark DNS Behavior , 2007, DIMVA.
[2] Xun Wang,et al. An Invisible Localization Attack to Internet Threat Monitors , 2009, IEEE Transactions on Parallel and Distributed Systems.
[3] A. Rama Mohan Reddy,et al. IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots , 2012, ArXiv.
[4] Yoichi Shinoda,et al. Vulnerabilities of Passive Internet Threat Monitors , 2005, USENIX Security Symposium.
[5] L. Jean Camp,et al. A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy , 2009, IFIPTM.
[6] Koji Nakao,et al. nicter: a large-scale network incident analysis system: case studies for understanding threat landscape , 2011, BADGERS '11.
[7] Riccardo Bettati,et al. Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures , 2010, IEEE Transactions on Computers.
[8] Vinod Yegneswaran,et al. Honeynet games: a game theoretic approach to defending network monitors , 2011, J. Comb. Optim..
[9] F. E. Grubbs. Procedures for Detecting Outlying Observations in Samples , 1969 .
[10] A. Rama Mohan Reddy,et al. Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots , 2012, ArXiv.
[11] Mary K. Vernon,et al. Mapping Internet Sensors with Probe Response Attacks , 2005, USENIX Security Symposium.
[12] Jiang Wu,et al. Effective worm detection for various scan techniques , 2006, J. Comput. Secur..
[13] Shinoda Yoichi,et al. The Statistical Protection for Internet Threat Monitors , 2005 .