메뉴 건너뛰기




Volumn , Issue , 2003, Pages 262-271

Enhancing byte-level network intrusion detection signatures with context

Author keywords

Bro; Evaluation; Network Intrusion Detection; Pattern Matching; Security; Signatures; Snort

Indexed keywords

COMPUTER HARDWARE; COMPUTER NETWORKS; COMPUTER PROGRAMMING LANGUAGES; EVALUATION; NETWORK PROTOCOLS; PATTERN MATCHING; SEMANTICS; TELECOMMUNICATION TRAFFIC;

EID: 14844324904     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948109.948145     Document Type: Conference Paper
Times cited : (215)

References (37)
  • 1
    • 18744410777 scopus 로고    scopus 로고
    • arachNIDS. http://whitehats.com/ids/.
  • 2
    • 18744407969 scopus 로고    scopus 로고
    • Web archive of versions of software and signatures used in this paper. http://www.net.in.tum.de/~robin/ccs03.
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • August
    • S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3):186-205, August 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 4
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis, IN, USA
    • R. G. Bace. Intrusion Detection. Macmillan Technical Publishing, Indianapolis, IN, USA, 2000.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 6
    • 18744396492 scopus 로고    scopus 로고
    • Bugtraq. http://www.securityfocus.com/bid/1187.
  • 7
    • 18744399418 scopus 로고    scopus 로고
    • CERT Advisory CA-2002-27 Apache/mod_ssl Worm
    • CERT Advisory CA-2002-27 Apache/mod_ssl Worm. http://www.cert-org/ advisories/CA-2002-27.html.
  • 10
    • 84880755155 scopus 로고    scopus 로고
    • Evaluation of the diagnostic capabilities of commercial intrusion detection systems
    • number 2516 in Lecture Notes in Computer Science. Springer-Verlag
    • H. Debar and B. Morin. Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • (2002) Proc. Recent Advances in Intrusion Detection
    • Debar, H.1    Morin, B.2
  • 12
    • 1542350966 scopus 로고    scopus 로고
    • Fast content-based packet handling for intrusion detection
    • UC San Diego, May
    • M. Fisk and G. Varghese. Fast Content-Based Packet Handling for Intrusion Detection. Technical Report CS2001-0670, UC San Diego, May 2001.
    • (2001) Technical Report , vol.CS2001-0670
    • Fisk, M.1    Varghese, G.2
  • 13
    • 18744362822 scopus 로고    scopus 로고
    • Remote OS detection via TCP/IP stack finger printing
    • Fyodor
    • Fyodor. Remote OS detection via TCP/IP Stack Finger Printing. Phrack Magazine, 8(54), 1998.
    • (1998) Phrack Magazine , vol.8 , Issue.54
  • 15
    • 33750943764 scopus 로고    scopus 로고
    • Capacity verification for high speed network intrusion detection systems
    • number 2516 in Lecture Notes in Computer Science. Springer-Verlag
    • M. Hall and K. Wiley. Capacity Verification for High Speed Network Intrusion Detection Systems. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • (2002) Proc. Recent Advances in Intrusion Detection
    • Hall, M.1    Wiley, K.2
  • 16
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Washington, D.C., August
    • M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. 10th USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) Proc. 10th USENIX Security Symposium
    • Handley, M.1    Kreibich, C.2    Paxson, V.3
  • 19
    • 0344871633 scopus 로고    scopus 로고
    • Intrusion detection system product survey
    • Los Alamos National Laboratory, June
    • K. Jackson. Intrusion detection system product survey. Technical Report LA-UR-99-3883, Los Alamos National Laboratory, June 1999.
    • (1999) Technical Report , vol.LA-UR-99-3883
    • Jackson, K.1
  • 20
    • 84940110274 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
    • IEEE Computer Society Press, May
    • U. Lindqvist and P. A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proc. IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 1999.
    • (1999) Proc. IEEE Symposium on Security and Privacy
    • Lindqvist, U.1    Porras, P.A.2
  • 22
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • October
    • R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4):579-595, October 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 23
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • number 2516 in Lecture Notes in Computer Science. Springer-Verlag
    • R. Lippmann, S. Webster, and D. Stetson. The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • (2002) Proc. Recent Advances in Intrusion Detection
    • Lippmann, R.1    Webster, S.2    Stetson, D.3
  • 24
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • November
    • J. McHugh. Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security, 3(4):262-294, November 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 25
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 26
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore, MD, October
    • P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In National Information Systems Security Conference, Baltimore, MD, October 1997.
    • (1997) National Information Systems Security Conference
    • Porras, P.A.1    Neumann, P.G.2
  • 27
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc., January
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., January 1998.
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 29
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • USENIX Association, November
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In Proc. 13th Systems Administration Conference (LISA), pages 229-238. USENIX Association, November 1999.
    • (1999) Proc. 13th Systems Administration Conference (LISA) , pp. 229-238
    • Roesch, M.1
  • 30
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • USENIX Association, August
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proc. 8th USENIX Security Symposium. USENIX Association, August 1999.
    • (1999) Proc. 8th USENIX Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 33
    • 18744397358 scopus 로고    scopus 로고
    • tcpdump. http://www.tcpdump.org.
  • 34
    • 18744391782 scopus 로고    scopus 로고
    • Valgrind. http://developer.kde.org/~sewardj.
  • 36
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network-based intrusion detection system
    • G. Vigna and R. A. Kemmerer. Netstat: A network-based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 37
    • 18744398863 scopus 로고    scopus 로고
    • Whisker, http://www.wiretrip.net/rfp.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.