完整後設資料紀錄
DC 欄位語言
dc.contributor.authorJong, Chang-Han
dc.contributor.authorShieh, Shiuh-Pyng
dc.date.accessioned2009-08-23T04:41:38Z
dc.date.accessioned2020-05-25T06:40:04Z-
dc.date.available2009-08-23T04:41:38Z
dc.date.available2020-05-25T06:40:04Z-
dc.date.issued2006-10-16T01:43:11Z
dc.date.submitted2002-12-18
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/1327-
dc.description.abstractTo detect distributed denial of service and distributed scanning attacks, we propose Anomaly Dispersion Scheme (ADS). Observing the creation of packet fields in attack programs and normal programs, ADS monitors the distributions of packet fields, which alter when the attack programs using raw socket interface partake in, to detect intrusion. The sets of anomaly packet fields are attack signatures.
dc.description.sponsorship東華大學,花蓮縣
dc.format.extent16p.
dc.format.extent324847 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2002 ICS會議
dc.subjectDistributed Denial of Service
dc.subjectScanning
dc.subjectNetwork Intrusion Detection
dc.subjectAnomaly Detection
dc.subject.otherCryptology and Information Security
dc.titleDetecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields
分類:2002年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002002000205.PDF317.23 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。