Network Attack Detection based on Multiple Entropies |
Kim Min-Taek
(LG CNS Entrue Consulting)
Kwon Ki Hoon (KAIST) Kim Sehun (KAIST) Choi Young-Woo (KAIST) |
1 | D. Moore et al, 'Inside the Slammer worm', IEEE Security & Privacy Magazine, vol.1 , no.4, pp. 33-39, July-Aug. 2003 DOI ScienceOn |
2 | Dorothy E. Denning, 'An intrusion detection model', IEEE Transactions on Software Engineering, vol.13 no.2, pp. 222-232, 1987 DOI ScienceOn |
3 | J. L. Hellerstein, F, Zhang, P, Shahabuddin, 'A statistical approach to predictive detection', Computer Networks, vol 35, pp.77-95, 2001 DOI ScienceOn |
4 | N. Ye, S. Vilbert and Q. Chen, 'Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data', IEEE Transactions on Reliability, vol.52, no.1, March, 2003 |
5 | Rocky K. C. Chang, 'Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial', IEEE Communications Magazine, Oct., 2002 |
6 | 박영호 등, '이동네트워크 환경에서 그룹키 관리구조,' 정보보호학회논문지, 2002 |
7 | 박영희 등, 'Diffie-Hallman 키 교환을 이용한 확장성을 가진 계층적 그룹키 설정 프로토콜,' 정보보호학회논문지, 2003 |
8 | Hood, C., and Ji. c., 'Proactive network fault detection', In Proceeding of IEEE INFOCOM'97, pp. 1147-1155, 1997 |
9 | Laura Feinstein and Ravindra Balupari, 'Statistical Approaches to DDoS attack Detection and Response', In Proceeding of the DARPA Information Survivability Conference and Exposition, 2003 |
10 | 권정옥 등, '일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH,' 정보보호학회논문지, 2002 |
11 | F. Zhang, J. L. Hellerstein, 'An Approach to On-line Predictive Detection', In Proceedings of 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Aug., 2000 |
12 | X. Gang, Z. Hui. 'Advanced methods for detecting unusual behaviors on networks in real-time', In Proceedings of International Conference on Communication Technology Proceedings, vol.1, pp. 291-295, Aug., 2000 |
13 | C.E. Shannon, and W. Weaver, The Mathematical Theory of Communication, University of Illinois Press, 1963 |
14 | 권기훈 등 '트래픽 분석에 의한 광대역 네트워크 조기 경보 기법', 정보보호학회논문지, 제 14권 4호, 8월, 111-121쪽, 2004 |
15 | 조태남 등, '(2,4)-트리를 이용한 그룹키 관리,' 정보보호학회논문지, 2001 |
16 | 이상원 등, 'Pairing을 이용한 트리 기반 그룹키 합의 프로토콜,' 정보보호학회논문지, 2003 |
17 | D. Moore et al, 'The Spread of the Sapphire/Slammer worm', http://www.ceide.org/outreach/papers/2003/sap-phire/sapphire.html |