1 |
W. El-Hajj, F. Aloul, Z. Trabelsi, N. Zaki, "On Detecting Port Scanning using Fuzzy Based Intrusion Detection System", Coll. of Inf. Technol., UAE Univ., Al-Ain, 2008.
|
2 |
Fyodor, The Art of Port Scaning, Phrack Magazine, Vol. 7, Issue 52, 1997.
|
3 |
IANA, http://www.iana.org/assignments/port-numbers, 2010
|
4 |
H. Kikuchi, T. Kobori, "Orthogonal Expansion of Portscanning Packets", Intl. Conf. on Network-Based Information Systems, 2009.
|
5 |
S. K. Kim, S. H. Lee and S. W. Seo, "An Automatic Portscan Detection System with Adaptive Threshold Setting", Journal of Communications and Networks, Vol. 12, No. 1, Feb. 2010.
|
6 |
J. Jung, V. Paxson, A. W. Berger, H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing", Proc. of the 2004 IEEE Symposium on Security and Privacy, 2004.
|
7 |
A. Lazarevic, V. Kummar, J. Srivastava, Managing Cyber Threats : Issues, Approaches and challenges, Springer, 2005
|
8 |
C. Leckie, R. Kotagiri, "A probabilistic approach to detecting network scans", Proc. of the Eighth IEEE Network Operations and Management Symposium (NOMS 2002), Florence, Italy, 2002.
|
9 |
C. B. Lee, C. Roedel, E. Silenok, "Detection and Characterization of Port Scan Attacks", http://cseweb.ucsd.edu/users/ clbailey/PortScans.pdf, Univeristy of California, Department of Computer Science & Engineering, San Diego, 2003.
|
10 |
G. Lyon, The Art of Port Scaning, Phrack Magazine, Vol. 7, Issue 52, 1997.
|
11 |
J. Mai, A. Sridharan, C. N. Chuah, H. Zang, T. Ye, "Impact of packet sampling on portscan detection", IEEE Journal on Selected Areas in Communication, vol. 24, no. 12, 2006.
|
12 |
S. Northcutt, J. Novak, Network intrusion detection an analyst's handbook, 2nd Edition, New Riders, 2002.
|
13 |
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time", Proc. of the 7th USENIX Security Symposium, San Antonio, TX, pp. 2435-2463, 1999.
|
14 |
F. J. Provost, T. Fawcett, "Analysis and Visualizatio of Classifier Performance: Comparison under Imprecise Class and Cost Distributions", Proc. of the 3rd Intl. Conf. on Knowledge Discovery and Data Mining, Newport Beach, CA, pp. 43-48, 1997 .
|
15 |
Snort, Intrusion Detection System, http://www.snort.org, 2010.
|
16 |
S. Staniford, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagl, K. Levitt, C. Wee, R. Yip, and D. Zerkle, "GrIDS - a graph based intrusion detection system for large networks", Proc. of the 19th National Information Systems Security Conference (NISS '96), 1996.
|
17 |
S. Staniford, J. A. Hoagland, J. M. Mcalerney, "Practical automated detection of stealthy portscans", Journal of Computer Security, 2002.
|