Subject

Subjects : Attack Detection

  • Articles (25)
  • Patents (2)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2023 Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection   Choi Yangseo  전자통신동향분석, v.38, no.5, pp.71-80 원문
Conference 2022 Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset   Kijung Bong  International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1471-1476 7 원문
Conference 2017 Netflow Based HTTP Get Flooding Attack Analysis   Jung Tae Kim  International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Conference 2016 Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis   Jung Tae Kim  International Conference on Evolving Internet (INTERNET) 2016, pp.20-25
Journal 2015 Short Dynamic Group Signature Scheme Supporting Controllable Linkability   Jung Yeon Hwang  IEEE Transactions on Information Forensics and Security, v.10, no.6, pp.1109-1124 57 원문
Conference 2015 Host Behavior Characteristic Description Method Against APT Attack Detection   Moon Dae Sung  World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7
Conference 2014 Abnormal Behavior Detection Technique based on Big Data   Kim Hyun Joo  International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 6 원문
Journal 2013 Mobile Malware Detection Using Correlational Analysis   Yoon Seung Yong  International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58
Journal 2013 An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques   Yu Jae Hak  Journal of Systems Architecture, v.59, no.10 Part B, pp.1005-1012 42 원문
Conference 2013 MAC Spoofing Attack Detection based on EVM in 802.11 WLAN   An Gaeil  International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM) 2013, pp.163-167
Journal 2013 Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection   Choi Yangseo  Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 0
Conference 2013 A DNS Flooding Attack Detection by Attack Traffic Characteristics Analysis   Byoung Koo Kim  International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.875-877
Conference 2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Choi Yangseo  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 14 원문
Conference 2011 Rooting attack detection method on the Android-based smart phone   장원준  International Conference on Computer Science and Network Technology (ICCSNT) 2011, pp.477-481 9 원문
Conference 2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Choi Yangseo  International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference 2011 Traffic Flooding Attack Detection and Classification with SNMP MIB via SVDD and Sparse Representation   Yu Jae Hak  International Conference on Information System, Computer Engineering and Application (ICISCEA) 2011, pp.26-34
Conference 2011 A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment   정성모  International Conference on Advanced Communication and Networking (ACN) 2011 (CCIS 199), v.199, pp.31-35 3 원문
Conference 2010 Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention   Choi Yangseo  International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 27 원문
Conference 2009 Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points   조유희  Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009 (LNCS 5787), v.5787, pp.385-394 0 원문
Conference 2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Yoon Seung Yong  International Conference on Security and Management (SAM) 2009, pp.1-5
Journal 2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Kim Ik Kyun  International Journal of Computers, v.1, no.3, pp.104-114
Conference 2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Kim Ik Kyun  International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Conference 2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Kim Ik Kyun  International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference 2004 A Combined Data Mining Approach for DDoS Attack Detection   김미희  International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.943-950 24 원문
Conference 2001 A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation   Choi Yangseo  International Conference on Information Security and Cryptology (ICISC) 2001 (LNCS 2288), v.2288, pp.146-159 1
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2007 APPARATUS AND METHOD FOR DETECTING NETWORK ATTACK UNITED STATES
Registered 2013 제어 네트워크에서의 스캐닝 공격 탐지 장치 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.