메뉴 건너뛰기




Volumn , Issue , 2002, Pages 255-264

Mimicry attacks on host-based intrusion detection systems

Author keywords

Anomaly detection; Evasion attacks; Host based intrusion detection

Indexed keywords

AUTOMATA THEORY; CLIENT SERVER COMPUTER SYSTEMS; COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; COMPUTER SIMULATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FORMAL LANGUAGES;

EID: 0038011184     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/586110.586145     Document Type: Conference Paper
Times cited : (561)

References (27)
  • 7
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M. Handley, C. Kreibich, V. Paxson, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," 10th USENIX Security Symposium, 2001.
    • 10th USENIX Security Symposium, 2001
    • Handley, M.1    Kreibich, C.2    Paxson, V.3
  • 10
    • 18944390941 scopus 로고    scopus 로고
    • The model checker spin
    • Special issue on Formal Methods in Software Practice, May
    • G.J. Holzmann, "The Model Checker Spin," IEEE Trans. on Software Engineering, Special issue on Formal Methods in Software Practice, May 1997.
    • (1997) IEEE Trans. on Software Engineering
    • Holzmann, G.J.1
  • 11
    • 0003620778 scopus 로고
    • Introduction to automata theory, languages, and computation
    • Addison-Wesley
    • J.E. Hopcroft, J.D. Ullman, Introduction to Automata Theory, Languages, and Computation, Addison-Wesley, 1979.
    • (1979)
    • Hopcroft, J.E.1    Ullman, J.D.2
  • 13
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • T. Lane, C.E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Trans. Information & System Security, vol. 2, no. 3, pp.295-331, 1999.
    • (1999) ACM Trans. Information & System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 17
    • 84944239503 scopus 로고    scopus 로고
    • Using finite automata to mine execution data for intrusion detection: A preliminary report
    • C. Michael, A. Ghosh, "Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report," RAID 2000, LNCS 1907, pp. 66-79, 2000.
    • (2000) RAID 2000, LNCS 1907 , pp. 66-79
    • Michael, C.1    Ghosh, A.2
  • 18
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • 14 Dec.
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, 31 (23-24), pp.2435-2463, 14 Dec. 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 19
    • 37249008138 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Jan.
    • T.H. Ptacek, T.N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection," Secure Networks, Jan. 1998.
    • (1998) Secure Networks
    • Ptacek, T.H.1    Newsham, T.N.2
  • 22
    • 0037781377 scopus 로고    scopus 로고
    • Operating system stability and security through process homeostasis
    • Ph.D. dissertation, Univ. New Mexico, Jul.
    • A.B. Somayaji, "Operating System Stability and Security through Process Homeostasis," Ph.D. dissertation, Univ. New Mexico, Jul. 2002.
    • (2002)
    • Somayaji, A.B.1
  • 27
    • 84944248021 scopus 로고    scopus 로고
    • Intrusion detection using variable-length audit trail patterns
    • A. Wespi, M. Dacier, H. Debar, "Intrusion Detection Using Variable-Length Audit Trail Patterns," RAID 2000, LNCS 1907, pp.110-129, 2000.
    • (2000) RAID 2000, LNCS 1907 , pp. 110-129
    • Wespi, A.1    Dacier, M.2    Debar, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.