보안측면에서의 네트워크 이상징후 분석기술

  • 나중찬 (한국전자통신연구원 정보보호연구본부) ;
  • 김영국 (충남대학교 전기정보통신공학부)
  • Published : 2003.08.01

Abstract

Keywords

References

  1. 정현철, 변대용, '트래픽 분석을 통한 서비스거부공격 추적', http://www.certcc.or.kr, 2003.1.
  2. Bor-Sen Chen. Sen-Chueh Peng, Ku-Chen Wang, Traffic Modeling. Prediction, and Congestion Control for High-Speed Networks: A Fuzzy AR Approach, IEEE Transactions on Fuzzy Systems. Vol. 8, No. 5. Oct.2000
  3. Cisco Inc., Cisco:s IOS Netflow Feature, http://www.cisco.com/warp/public/732/netflow
  4. David Moore, Gffrey M. Voelker and Stefan Savage, Inferring Internet Denial-of-Service Activity, http://www.dante.net/pubs/dip/42/42.html
  5. Denial of Service and Emerging Backbone Threats, Arbor Networks, June 12, 2002
  6. Internet Performance Measurementand Analysis Project Home Page, http://www.merit.edu/ipma
  7. Hong Fei, Wu Zhimei, A Novel Traffic Model Based on Wavelet Analysis, Proceedings of ICCT2003
  8. Joao B. D. Cabrera, Lundy Lewis, et. al., Proactive Intrusion Detectionand Distributed of Denial of Service. Journal of Network and System Management, Vol. 10, No. 2, June 2002
  9. Paul Barford, Jeffery Kline, et. al. A signal analysis of network traffic anomalies - Proceedings of ACMIMW02
  10. Sheng Ma, Chuanayi Ji, Modeling Heterogeneous Network Traffic in Wavelet Domain, IEEE/ACM Transactions on Networking, Vol. 9. No5, Oct. 2001
  11. Yantai Shu, Yu Liu. et. al. Wireless Traffic Modeling and Prediction Using Seasonal ARIMA Models