Cooperative Intrusion Traceback and Response Architecture (CITRA)
暂无分享,去创建一个
D. Sterne | R. Smith | Harley Holliday | D. Schnackengerg | K. Djahandari | D. Sterne | K. Djahandari | D. Schnackengerg | H. Holliday | R. Smith | R. Smith | Harley Holliday
[1] Russell Merris,et al. EXTENSIONS OF THE , 1983 .
[2] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[3] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[4] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[5] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[6] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Alex C. Snoeren,et al. Hash-based IP traceback , 2001, SIGCOMM '01.
[8] Mark E. Segal,et al. A Specification-Based Approach for Building Survivable Systems , 1998 .
[9] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[10] Dan Schnackenberg,et al. Infrastructure for intrusion detection and response , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[11] Timothy Fraser,et al. Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[12] Shyhtsun Felix Wu,et al. Design and implementation of a real-time decentralized source identification system for untrusted IP packets , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.