|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Abnormal Policy Detection and Correction Using Overlapping Transition Sunghyun KIM Heejo LEE | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D
No. 5 ;
pp. 1053-1061
Type of Manuscript:
Special Section PAPER (Special Section on Information and Communication System Security)
Category: Keyword: firewall, security policy, policy anomalies, network security, ACL, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
|
|
|
|
IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks Ping DU Shunji ABE | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D
No. 5 ;
pp. 1274-1281
Type of Manuscript:
Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network Security Keyword: denial of service attack, network security, attack detection, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
Large-Throughput Anomaly Prevention Mechanism Implemented in Dynamic Reconfigurable Processor Takashi ISOBE | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2006/09/01
Vol. E89-B
No. 9 ;
pp. 2440-2447
Type of Manuscript:
Special Section PAPER (Special Section on Networking Technologies for Overlay Networks)
Category: Keyword: network security, DDoS, worm, P2P, anomaly prevention, DRP, IDS, IPS, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|