메뉴 건너뛰기




Volumn , Issue , 2004, Pages 21-30

Testing network-based intrusion detection signatures using mutant exploits

Author keywords

Intrusion Detection; Quality Metrics; Security Testing

Indexed keywords

ABSTRACTING; AUTOMATION; COMPUTER CRIME; COMPUTER NETWORKS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; LARGE SCALE SYSTEMS; MATHEMATICAL MODELS; SENSORS; TELECOMMUNICATION TRAFFIC;

EID: 14844322335     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030088     Document Type: Conference Paper
Times cited : (149)

References (34)
  • 2
    • 14844307485 scopus 로고    scopus 로고
    • S. Aubert. Idswakeup. http://www.hsc.fr/-ressources/outils/idswakeup/, 2000.
    • (2000) Idswakeup
    • Aubert, S.1
  • 3
    • 1942425806 scopus 로고    scopus 로고
    • Vulnerability testing of software system using fault injection
    • COAST, Purdue University, West Lafayette, IN, US, April
    • W. Du and A. P. Mathur. Vulnerability Testing of Software System Using Fault Injection. Technical Report, COAST, Purdue University, West Lafayette, IN, US, April 1998.
    • (1998) Technical Report
    • Du, W.1    Mathur, A.P.2
  • 4
    • 0006064357 scopus 로고    scopus 로고
    • Addendum to "testing and evaluating computer intrusion detection systems"
    • September
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Addendum to "Testing and Evaluating Computer Intrusion Detection Systems". CACM, 42(9):15, September 1999.
    • (1999) CACM , vol.42 , Issue.9 , pp. 15
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 5
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • July
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Testing and Evaluating Computer Intrusion Detection Systems. CACM, 42(7):53-61, July 1999.
    • (1999) CACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 10
  • 12
    • 0029327426 scopus 로고
    • Fault injection: A method for validating computer-system dependability
    • D. Pradhan J. Clark. Fault Injection: A Method For Validating Computer-System Dependability. IEEE Computer, 28(6):47-56, 1995.
    • (1995) IEEE Computer , vol.28 , Issue.6 , pp. 47-56
    • Pradhan, D.1    Clark, J.2
  • 13
    • 84860097203 scopus 로고    scopus 로고
    • K2. ADMmutate. http://www.ktwo.ca/security.html, 2004.
    • (2004) K2. ADMmutate
  • 15
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
    • November
    • J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transaction on Information and System Security, 3(4), November 2000.
    • (2000) ACM Transaction on Information and System Security , vol.3 , Issue.4
    • McHugh, J.1
  • 16
    • 84860094122 scopus 로고    scopus 로고
    • Metasploit Project. Metasploit. http://www.metasploit.com/, 2004.
    • (2004) Metasploit
  • 17
    • 84903593793 scopus 로고    scopus 로고
    • An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
    • Las Vegas, Nevada, December
    • D. Mutz, G. Vigna, and R.A. Kemmerer. An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. In Proceedings of the 2003 Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2003.
    • (2003) Proceedings of the 2003 Annual Computer Security Applications Conference
    • Mutz, D.1    Vigna, G.2    Kemmerer, R.A.3
  • 18
    • 84860102067 scopus 로고    scopus 로고
    • Neohapsis OSEC Project. Neohapsis OSEC. http://osec.neohapsis.com/, 2004.
    • (2004) Neohapsis OSEC
  • 19
    • 35248855056 scopus 로고
    • Netscape Communications Corporation. SSL 2.0 Protocol Specification. http://wp.netscape.com/eng/security/SSL.2.html, 1995.
    • (1995) SSL 2.0 Protocol Specification
  • 20
    • 85088189436 scopus 로고    scopus 로고
    • th Edition), http://www.nss.co.uk/ips, 2004.
    • (2004) th Edition)
  • 22
    • 84860099005 scopus 로고    scopus 로고
    • Hypertext Transfer Protocol
    • Network Working Group. Hypertext Transfer Protocol - HTTP/1.1. http://www.w3.org/Protocols/rfc2616/rfc2616.html, 1999.
    • (1999)
  • 23
    • 84860102311 scopus 로고    scopus 로고
    • Next Generation Software Security Ltd. NGSS Evaluation, http://www.nextgenss.com/, 2004.
    • (2004) NGSS Evaluation
  • 24
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion and denial of service: Eluding network intrusion detection
    • Secure Networks, January
    • T.H. Ptacek and T.N. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical Report, Secure Networks, January 1998.
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 25
    • 0017959155 scopus 로고
    • Hints on test data selection: Help for the practicing programmer
    • R. J. Lipton R. A. DeMillo and F. G. Sayward. Hints on test data selection: Help for the practicing programmer. IEEE Computer, 11(4):34-43, 1978.
    • (1978) IEEE Computer , vol.11 , Issue.4 , pp. 34-43
    • Lipton, R.J.1    Demillo, R.A.2    Sayward, F.G.3
  • 26
    • 84858881738 scopus 로고    scopus 로고
    • Experience benchmarking intrusion detection systems
    • December
    • M. Ranum. Experience Benchmarking Intrusion Detection Systems. NFR Security White Paper, December 2001.
    • (2001) NFR Security White Paper
    • Ranum, M.1
  • 27
    • 84860094956 scopus 로고    scopus 로고
    • R. Graham. SideStep. http://www.robertgraham.com/tmp/sidestep.html, 2004.
    • (2004) SideStep
    • Graham, R.1
  • 29
    • 84860102540 scopus 로고    scopus 로고
    • D. Aitel. Sharefuzz. http://www.atstake.com/research/tools/ vulnerability_scanning/, 2004.
    • (2004) Sharefuzz
    • Aitel, D.1
  • 30
    • 84860102559 scopus 로고    scopus 로고
    • Sniph. Snot, http://www.sec33.com/sniph/, 2001.
    • (2001) Sniph. Snot
  • 31
    • 84860095914 scopus 로고    scopus 로고
    • D. Aitel. Spike, http://www.immunitysec.com/resources-freesoftware.shtml, 2004.
    • (2004) Spike
    • Aitel, D.1
  • 32
    • 84870646285 scopus 로고    scopus 로고
    • The Apache HTTP Server Project. Apache HTTP Server, http://httpd.apache. org/, 2004.
    • (2004) Apache HTTP Server
  • 33
    • 33748510270 scopus 로고    scopus 로고
    • The OpenSSL Project. OpenSSL. http://www.openssl.org/, 2004.
    • (2004) OpenSSL
  • 34
    • 0012290395 scopus 로고    scopus 로고
    • A 'crystal ball' for software liability
    • J. Voas, G. McGraw, L. Kassab, and L. Voas. A 'Crystal Ball' for Software Liability. IEEE Computer, 30(6):29-36, 1997.
    • (1997) IEEE Computer , vol.30 , Issue.6 , pp. 29-36
    • Voas, J.1    McGraw, G.2    Kassab, L.3    Voas, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.