An Analysis of, Network Beaconing Activity for Incident Response, 2008. ,
CIDS: An agent-based intrusion detection system. Computers & Security 24, pp.387-398, 2005. ,
DOI : 10.1016/j.cose.2005.01.004
SSHCure: A Flow-Based SSH Intrusion Detection System, Proceedings of the 6th International Conference on Autonomous Infrastructure, Management, and Security, pp.86-97, 2012. ,
DOI : 10.1007/978-3-642-30633-4_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.997
Flow-based Monitoring of Honeypots, Proceedings of 7th International Conference on Security and Protection of Information, 2013. ,
Identification and Entity Authentication, Boca Raton, 1997. ,
DOI : 10.1201/9781439821916.ch10
Analyzing Malicious SSH Login Attempts, 2006. ,
An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, p.343356, 2010. ,
DOI : 10.1109/SURV.2010.032210.00054
A Distributed Active Response Architecture for Preventing SSH Dictionary Attacks, p.8489, 2008. ,
Flow-based Detection of RDP Brute-force Attacks, Proceedings of 7th International Conference on Security and Protection of Information, 2013. ,
A Flow-Level Taxonomy and Prevalence of Brute Force Attacks, Advances in Computing and Communications, pp.666-675, 2011. ,
DOI : 10.1109/SURV.2010.032210.00054