Abstract | ||
---|---|---|
Coordinated attacks and probes have been observed against several networks that we protect. We describe some of these attacks and provide insight into how and why they are carried out. We also suggest hypotheses for some of the more puzzling probes. Methods for detecting these coordinated attacks are provided. |
Year | Venue | Keywords |
---|---|---|
1999 | Workshop on Intrusion Detection and Network Monitoring | coordinated attack,analysis technique,puzzling probe,analysis techniques,coordinated attacks |
Field | DocType | ISBN |
Computer security | Conference | 1-880446-37-5 |
Citations | PageRank | References |
11 | 2.28 | 0 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
John Green | 1 | 11 | 2.28 |
David Marchette | 2 | 11 | 2.28 |
Stephen Northcutt | 3 | 11 | 2.28 |
Bill Ralph | 4 | 11 | 2.28 |