Sequence Number-Based MAC Address Spoof Detection (English)
- New search for: Guo, Fanglu
- New search for: Chiueh, Tzi-cker
- New search for: Guo, Fanglu
- New search for: Chiueh, Tzi-cker
In:
Recent Advances in Intrusion Detection
7
;
309-329
;
2006
- Article/Chapter (Book) / Electronic Resource
-
Title:Sequence Number-Based MAC Address Spoof Detection
-
Contributors:Guo, Fanglu ( author ) / Chiueh, Tzi-cker ( author )
-
Published in:Recent Advances in Intrusion Detection , 7 ; 309-329Lecture Notes in Computer Science ; 3858, 7 ; 309-329
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2006-01-01
-
Size:21 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Virtual Playgrounds for Worm Behavior InvestigationJiang, Xuxian / Xu, Dongyan / Wang, Helen J. / Spafford, Eugene H. et al. | 2006
- 22
-
Empirical Analysis of Rate Limiting MechanismsWong, Cynthia / Bielski, Stan / Studer, Ahren / Wang, Chenxi et al. | 2006
- 43
-
COTS Diversity Based Intrusion Detection and Application to Web ServersTotel, Eric / Majorczyk, Frédéric / Mé, Ludovic et al. | 2006
- 63
-
Behavioral Distance for Intrusion DetectionGao, Debin / Reiter, Michael K. / Song, Dawn et al. | 2006
- 82
-
FLIPS: Hybrid Adaptive Intrusion PreventionLocasto, Michael E. / Wang, Ke / Keromytis, Angelos D. / Stolfo, Salvatore J. et al. | 2006
- 102
-
Towards Software-Based Signature Detection for Intrusion Prevention on the Network CardBos, H. / Huang, Kaiming et al. | 2006
- 124
-
Defending Against Injection Attacks Through Context-Sensitive String EvaluationPietraszek, Tadeusz / Berghe, Chris Vanden et al. | 2006
- 146
-
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry AttacksSufatrio / Yap, Roland H. C. et al. | 2006
- 165
-
On Random-Inspection-Based Intrusion DetectionChung, Simon P. / Mok, Aloysius K. et al. | 2006
- 185
-
Environment-Sensitive Intrusion DetectionGiffin, Jonathon T. / Dagon, David / Jha, Somesh / Lee, Wenke / Miller, Barton P. et al. | 2006
- 207
-
Polymorphic Worm Detection Using Structural Information of ExecutablesKruegel, Christopher / Kirda, Engin / Mutz, Darren / Robertson, William / Vigna, Giovanni et al. | 2006
- 227
-
Anomalous Payload-Based Worm Detection and Signature GenerationWang, Ke / Cretu, Gabriela / Stolfo, Salvatore J. et al. | 2006
- 247
-
On Interactive Internet Traffic ReplayHong, Seung-Sun / Wu, S. Felix et al. | 2006
- 265
-
Interactive Visualization for Network and Port Scan DetectionMuelder, Chris / Ma, Kwan-Liu / Bartoletti, Tony et al. | 2006
- 284
-
A Fast Static Analysis Approach to Detect Exploit Code Inside Network FlowsChinchani, Ramkumar / Berg, Eric et al. | 2006
- 309
-
Sequence Number-Based MAC Address Spoof DetectionGuo, Fanglu / Chiueh, Tzi-cker et al. | 2006
- 330
-
A Specification-Based Intrusion Detection Model for OLSRTseng, Chinyang Henry / Song, Tao / Balasubramanyam, Poornima / Ko, Calvin / Levitt, Karl et al. | 2006