메뉴 건너뛰기




Volumn , Issue , 2004, Pages 2-11

Operational experiences with high-volume network intrusion detection

Author keywords

Bro; Evaluation; Network intrusion detection; Security

Indexed keywords

COMPUTER CRIME; COMPUTER HARDWARE; DATA STRUCTURES; EVALUATION; HIGH LEVEL LANGUAGES; PERSONAL COMPUTERS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 14844312929     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030086     Document Type: Conference Paper
Times cited : (123)

References (28)
  • 3
    • 33244459892 scopus 로고    scopus 로고
    • Improving passive packet capture: Beyond device polling
    • University of Pisa
    • L. Deri. Improving passive packet capture: Beyond device polling. Technical report, University of Pisa, 2003.
    • (2003) Technical Report
    • Deri, L.1
  • 4
    • 0001817861 scopus 로고    scopus 로고
    • Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic
    • A. Feldmann, A. C. Gilbert, and W. Willinger. Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic. In Proc. of ACM SIGCOMM, 1998.
    • (1998) Proc. of ACM SIGCOMM
    • Feldmann, A.1    Gilbert, A.C.2    Willinger, W.3
  • 6
    • 14844332300 scopus 로고    scopus 로고
    • GNU Binutils. http://www.gnu.org/software/binutils.
  • 7
    • 33750943764 scopus 로고    scopus 로고
    • Capacity verification for high speed network intrusion detection systems
    • number 2516 in Lecture Notes in Computer Science. Springer-Verlag
    • M. Hall and K. Wiley. Capacity verification for high speed network intrusion detection systems. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • (2002) Proc. Recent Advances in Intrusion Detection
    • Hall, M.1    Wiley, K.2
  • 10
    • 85077206746 scopus 로고
    • The BSD packet filter: A new architecture for user-level packet capture
    • S. McCanne and V. Jacobson. The BSD packet filter: A new architecture for user-level packet capture. In Proc. Winter 1993 USENIX Conference, 1993.
    • (1993) Proc. Winter 1993 USENIX Conference
    • McCanne, S.1    Jacobson, V.2
  • 14
    • 14844285148 scopus 로고    scopus 로고
    • mpatrol. http://www.cbmamiga.demon.co.uk/mpatrol.
  • 15
    • 0028491368 scopus 로고
    • Empirically-derived analytic models of wide-area tcp connections
    • V. Paxson. Empirically-derived analytic models of wide-area tcp connections. IEEE/ACM Transactions on Networking, 2(4), 1994.
    • (1994) IEEE/ACM Transactions on Networking , vol.2 , Issue.4
    • Paxson, V.1
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24
    • Paxson, V.1
  • 17
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc.
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., 1998.
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 18
    • 4544269217 scopus 로고    scopus 로고
    • Experiences benchmarking intrusion detection systems
    • NFR Security, Inc.
    • M. I. Ranum. Experiences benchmarking intrusion detection systems. Technical report, NFR Security, Inc., http://www.itsecurity.com/papers/nfr2.htm, 2001.
    • (2001) Technical Report
    • Ranum, M.I.1
  • 20
    • 14844330582 scopus 로고    scopus 로고
    • Cisco Catalyst 6500 Series
    • Configuring SPAN and RSPAN (Cisco Catalyst 6500 Series). http://www.cisoo.com/univercd/cc/td/doc/produot/lan/cat6000/sw_7_5/conf%g_gd/ span.pdf.
    • Configuring SPAN and RSPAN
  • 21
    • 14844295360 scopus 로고    scopus 로고
    • Snot
    • Snot, http://www.stolenshoes.net/sniph/index.html.
  • 23
    • 14844305634 scopus 로고    scopus 로고
    • Exploiting independent state for network intrusion detection
    • TU München
    • R. Sommer and V. Paxson. Exploiting independent state for network intrusion detection. Technical report, TU München, 2004.
    • (2004) Technical Report
    • Sommer, R.1    Paxson, V.2
  • 25
    • 14844319072 scopus 로고    scopus 로고
    • Stick
    • Stick. http://packetstormsecurity.nl/distributed/stick.htm.
  • 26
    • 14844296916 scopus 로고    scopus 로고
    • tcpdump. http://www.tcpdump.org.
  • 27
    • 14844312801 scopus 로고    scopus 로고
    • Valgrind.http://developer.kde.org/~sewardj/.
    • Valgrind
  • 28
    • 0031078972 scopus 로고    scopus 로고
    • Self-similarity through high-variability: Statistical analysis of ethemet lan traffic at the source level
    • W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson. Self-similarity through high-variability: statistical analysis of ethemet lan traffic at the source level. IEEE/ACM Transactions on Networking, 5(1), 1997.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.1
    • Willinger, W.1    Taqqu, M.S.2    Sherman, R.3    Wilson, D.V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.