메뉴 건너뛰기




Volumn , Issue , 2004, Pages 28-38

Automatic generation and analysis of NIDS attacks

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC GENERATION; NATURAL-DEDUCTION SYSTEMS; NETWORK INTRUSION DETECTION SYSTEM (NIDS); NIDS SIGNATURES;

EID: 21644443817     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.9     Document Type: Conference Paper
Times cited : (58)

References (50)
  • 1
    • 84860969342 scopus 로고    scopus 로고
    • Digital information society. Available at www.phreak.org.
  • 2
    • 4444272036 scopus 로고    scopus 로고
    • IBM Zurich Research Laboratory, September. Deliverable D3, Project MAFTIA IST-1999-11583
    • D. Alessandri, editor. Towards a Taxonomy of Intrusion Detection Systems and Attacks. IBM Zurich Research Laboratory, September 2001. Deliverable D3, Project MAFTIA IST-1999-11583, Available at www.maftia.org.
    • (2001) Towards a Taxonomy of Intrusion Detection Systems and Attacks
    • Alessandri, D.1
  • 4
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • Washington, DC, August
    • M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In USENIX Security Symposium, Washington, DC, August 2003.
    • (2003) USENIX Security Symposium
    • Christodorescu, M.1    Jha, S.2
  • 5
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • Washington, DC, August
    • S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In USENIX Security Symposium, Washington, DC, August 2003.
    • (2003) USENIX Security Symposium
    • Crosby, S.1    Wallach, D.2
  • 6
    • 4544359276 scopus 로고    scopus 로고
    • IBM Zurich Research Laboratory, August. Deliverable D10, Project MAFTIA IST-1999-11583
    • M. Dacier, editor. Design of an Intrusion-Tolerant Intrusion Detection System. IBM Zurich Research Laboratory, August 2002. Deliverable D10, Project MAFTIA IST-1999-11583, Available at www.maftia.org.
    • (2002) Design of An Intrusion-tolerant Intrusion Detection System
    • Dacier, M.1
  • 7
    • 18744414884 scopus 로고    scopus 로고
    • Evaluation of the diagnostic capabilities of commercial intrusion detection systems
    • Zurich, Switzerland, October
    • H. Debar and B. Morin. Evaluation of the diagnostic capabilities of commercial intrusion detection systems. In International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, October 2002.
    • (2002) International Symposium on Recent Advances in Intrusion Detection
    • Debar, H.1    Morin, B.2
  • 12
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Washington, DC, August
    • M. Handley and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In USENIX Security Symposium, Washington, DC, August 2001.
    • (2001) USENIX Security Symposium
    • Handley, M.1    Paxson, V.2
  • 13
  • 19
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • November
    • J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security, 3(4), November 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4
    • McHugh, J.1
  • 22
    • 84903593793 scopus 로고    scopus 로고
    • An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
    • Las Vegas, NV, December
    • D. Mutz, G. Vigna, and R. Kemmerer. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems. In Annual Computer Security Applications Conference, Las Vegas, NV, December 2003.
    • (2003) Annual Computer Security Applications Conference
    • Mutz, D.1    Vigna, G.2    Kemmerer, R.3
  • 24
    • 0040793976 scopus 로고    scopus 로고
    • Mechanized proofs of security protocols: Needham-schroeder with public keys
    • University of Cambridge Computer Laboratory
    • L. Paulson. Mechanized proofs of security protocols: Needham-Schroeder with public keys. Technical Report 413, University of Cambridge Computer Laboratory, 1997.
    • (1997) Technical Report , vol.413
    • Paulson, L.1
  • 25
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23/24), December 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24
    • Paxson, V.1
  • 30
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc., Calgary, Alberta, Canada
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical Report T2R-0Y6, Secure Networks, Inc., Calgary, Alberta, Canada, 1998.
    • (1998) Technical Report , vol.T2R-0Y6
    • Ptacek, T.H.1    Newsham, T.N.2
  • 34
    • 21644481066 scopus 로고    scopus 로고
    • Attack generation for NIDS testing using natural deduction
    • University of Wisconsin, Madison, January
    • S. Rubin, S. Jha, and B. P. Miller. Attack generation for NIDS testing using natural deduction. Technical Report 1496, University of Wisconsin, Madison, January 2004.
    • (2004) Technical Report , vol.1496
    • Rubin, S.1    Jha, S.2    Miller, B.P.3
  • 37
    • 84899126047 scopus 로고    scopus 로고
    • Active mapping: Resisting NIDS evasion without altering traffic
    • Oakland, CA, May
    • U. Shankar and V. Paxson. Active mapping: Resisting NIDS evasion without altering traffic. In IEEE Symposium. on Security and Privacy, Oakland, CA, May 2003.
    • (2003) IEEE Symposium on Security and Privacy
    • Shankar, U.1    Paxson, V.2
  • 39
    • 84860965379 scopus 로고    scopus 로고
    • Sniphs. Snot, January
    • Sniphs. Snot, January 2003. Available at www.stolenshoes.net/sniph/index.html.
    • (2003)
  • 40
    • 14844324904 scopus 로고    scopus 로고
    • Enhancing byte-level network intrusion detection signatures with context
    • Washington, DC, October
    • R. Sommer and V. Paxson. Enhancing byte-level network intrusion detection signatures with context. In ACM Conference on Computer and Communications Security, Washington, DC, October 2003.
    • (2003) ACM Conference on Computer and Communications Security
    • Sommer, R.1    Paxson, V.2
  • 47
    • 84860969343 scopus 로고    scopus 로고
    • The Tcpdump Group. TCPDUMP/LIBPCAP. Available at www.tcpdump.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.