完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChao, Chi-Shih
dc.contributor.authorChen, Yu-Sin
dc.contributor.authorLiu, An-Chi
dc.date.accessioned2009-06-02T08:40:23Z
dc.date.accessioned2020-07-05T06:31:26Z-
dc.date.available2009-06-02T08:40:23Z
dc.date.available2020-07-05T06:31:26Z-
dc.date.issued2006-06-09T02:38:39Z
dc.date.submitted2003-12-18
dc.identifier.urihttp://dspace.fcu.edu.tw/handle/2376/1709-
dc.description.abstractIn order to meet the high demands of network availability and reliability, today’s IDS (Intrusion Detecting System) is often constructed in major portal to protect the managed network from attacks. Generally, current IDS use the pattern matching method as the primary scheme to detect attacks. However, after integrating IDS into router, the pattern matching method may cause extreme computing load to router which deviates working correctly, even crashing, when under attacking. In this research, the analysis of network traffic variation is combined with the pattern matching method for decreasing the load arose from the attached IDS of the router. In addition, an overall monitoring system is designed to cooperate with the backbone routers which equipped our attack detecting mechanism. Network managers can not only realize an occurrence of an attack but also where the attack passes through the network by using this system. Besides, the firewall would be also built into the router which can be started by managers to provide first line protection after an attack is detected.
dc.description.sponsorship逢甲大學,台中市
dc.format.extent10P.
dc.format.extent689552 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries中華民國92年全國計算機會議
dc.subjectabrupt abnormal detection
dc.subjectstatistical reference window
dc.subjectnetwork flooding attacks
dc.subjectevent correlation
dc.subjectnetwork management
dc.subject.other資訊安全
dc.titleStatistical Detection for Network Flooding Attacks
分類:2003年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
IS_0662003169.pdf673.39 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。