[1]
|
Claise, B. (2004) Cisco Systems Net Flow Services Export Version, RFC 3954 (Informational). http://www.ietf.org/rfc/rfc3954.txt
|
[2]
|
Jung, J., Paxson, V., Berger, A.W. and Balakrishnan, H. (2004) Fast Ports Can Detection Using Sequential Hypothesis Testing. Proceeding of the IEEE Symposium on Security and Privacy, Oakland, 9-12 May 2004, 221-225.
|
[3]
|
Roesch, M. (1999) Snort-Lightweight Intrusion Detection for Networks. Proceedings of 13th USENIX Conference on System Administration, USENIX Association, Seattle, 7-12 November 1999, 229-238.
|
[4]
|
Snort. http://www.snort.org
|
[5]
|
Sridharan, A., Ye, T. and Bhattacharyya, S. (2006) Connectionless Port Scan Detection on the Backbone. 25th IEEE International Performance, Computing, and Communications Conference (IPC-CC 2006), Mesa, 10-12 April 2006, 10-19. http://dx.doi.org/10.1109/.2006.1629454
|
[6]
|
Spitzner, L. (2001) The Value of Honeypots, Part One: Definitions and Values of Honeypots. Security Focus. http://www.securityfocus.com/infocus/1492
|
[7]
|
Lee, C.B., Roedel, C. and Silenok, E. (2003) Detection and Characterization of Port Scan Attacks. Department of Computer Science and Engineering, University of California, San Diego.
|
[8]
|
Bhuyan, M.H., Bhattacharyya, D.K. and Kalita, J.K. (2011) Surveying Port Scans and Their Detection Methodologies. The Computer Journal, 54, 1565-1581. http://dx.doi.org/10.1093/comjnl/bxr035
|
[9]
|
Mai, J., Sridharan, A., Chuah, C.N., Zang, S.M.H. and Ye, T. (2006) Impact of Packet Sampling on Ports Can Detection. IEEE Journal on Selected Areas in Communications, 24, 2285-2298. http://dx.doi.org/10.1109/JSAC.2006.884027
|
[10]
|
Mai, J., Chuah, C.N., Sridharan, A., Ye, T. and Zang, H. (2006) Is Sampled Data Sufficient for Anomaly Detection? Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeiro, New York, 165-176. http://dx.doi.org/10.1145/1177080.1177102
|
[11]
|
IETF Packet Sampling (PSAMP) Working Group. http://www.ietf.org/html.charters/psamp-charter.html
|
[12]
|
Zseby, T., Molina, M., Duffield, N., Niccolini, S. and Raspall, F. (2009) Sampling and Filtering Techn-iques for IP Packet Selection (RFC 5475). http://www.rfc-editor.org/rfc/rfc5475.txt
|
[13]
|
Brownlee, N. (1997) Traffic Flow Measurement: Experiences with Ne Tra Met (RFC2123). http://tools.ietf.org/html/rfc2123
|
[14]
|
Duffield, N. (2004) Sampling for Passive Internet Measurement: A Review. Statistical Science, 19, 472-498. http://dx.doi.org/10.1214/088342304000000206
|
[15]
|
Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K. and Zissman, M.A. (2000) Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation. Proceedings of the IEEE DARPA Information Survivability Conference and Exposition, 2, 12-26.
|