Network attacks: Taxonomy, tools and systems
- 1 April 2014
- journal article
- review article
- Published by Elsevier BV in Journal of Network and Computer Applications
- Vol. 40, 307-324
- https://doi.org/10.1016/j.jnca.2013.08.001
Abstract
No abstract availableKeywords
Funding Information
- Department of Information Technology (DIT)
- Council of Scientific & Industrial Research (CSIR)
- Government of India
- National Science Foundation (NSF) (CNS-095876, CNS-0851783)
This publication has 40 references indexed in Scilit:
- A survey of network flow applicationsJournal of Network and Computer Applications, 2013
- A Survey of Outlier Detection Methods in Network Anomaly IdentificationThe Computer Journal, 2011
- Network forensic frameworks: Survey and research challengesDigital Investigation, 2010
- A survey of coordinated attacks and collaborative intrusion detectionComputers & Security, 2010
- Anomaly detectionACM Computing Surveys, 2009
- Anomaly-based network intrusion detection: Techniques, systems and challengesComputers & Security, 2009
- Defending against spoofed DDoS attacks with path fingerprintComputers & Security, 2005
- First‐order versus high‐order stochastic models for computer intrusion detectionQuality and Reliability Engineering International, 2002
- ADAMACM SIGMOD Record, 2001
- A survey of intrusion detection techniquesComputers & Security, 1993