2000
DOI: 10.1016/s1389-1286(00)00135-3
|View full text |Cite
|
Sign up to set email alerts
|

Towards trapping wily intruders in the large

Abstract: The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out in a timely and accurate manner, the analysis required to detect network abusers. The problem is made even more difficult with the devious techniques (e.g. spoofing) used by the hackers.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2002
2002
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…2. The characteristics may be of use in differentiating traffic that is 'not natural', which may be due to the intruders 22 in networks or an 'abnormal' traffic situation in a busy city. The change of nature of traffic will probably result in a change of its characteristics.…”
mentioning
confidence: 99%
“…2. The characteristics may be of use in differentiating traffic that is 'not natural', which may be due to the intruders 22 in networks or an 'abnormal' traffic situation in a busy city. The change of nature of traffic will probably result in a change of its characteristics.…”
mentioning
confidence: 99%
“…To determine the similarity of the traffic on the communication links, we make use of traffic-flow pattern matching (Kim and Helmy, 2005;Mansfield et al, 2000). There are two separate procedures in pattern matching: trend-pattern matching and volume-pattern matching.…”
Section: Tracebackmentioning
confidence: 99%
“…To characterize attack traffic, we use traffic pattern [11] and traffic volume. Traffic pattern and traffic volume represent abnormal characteristics of attack traffic.…”
Section: Swat Architecture Overviewmentioning
confidence: 99%
“…There are several IP traceback schemes proposed for the Internet such as packet marking [14], logging [11], ICMP traceback [6,13], and others [5]. Such traceback schemes developed for the fixed networks are not directly applicable to MANETs due to the following reasons.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation