메뉴 건너뛰기




Volumn , Issue , 2004, Pages 168-178

Detecting attacks that exploit application-logic errors through application-level auditing

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION-LOGIC ERRORS; DETECTING ATTACKS; NETWORK BASED INTRUSION DETECTION SYSTEM (NIDS); OPENSSH SERVERS;

EID: 21644485726     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.17     Document Type: Conference Paper
Times cited : (9)

References (38)
  • 1
    • 84947584994 scopus 로고    scopus 로고
    • Application-integrated data collection for security monitoring
    • LNCS, Davis, CA, October Springer
    • M. Almgren and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In Proceedings of Recent Advances in Intrusion Detection (RAID), LNCS, pages 22-36, Davis, CA, October 2001. Springer.
    • (2001) Proceedings of Recent Advances in Intrusion Detection (RAID) , pp. 22-36
    • Almgren, M.1    Lindqvist, U.2
  • 6
    • 85084160094 scopus 로고
    • Profiling and tracing dynamic library usage via interposition
    • Boston, MA
    • T. W. Curry. Profiling and Tracing Dynamic Library Usage Via Interposition. In USENIX Summer 1994 Technical Conference, pages 267-278, Boston, MA, 1994.
    • (1994) USENIX Summer 1994 Technical Conference , pp. 267-278
    • Curry, T.W.1
  • 15
    • 0027808377 scopus 로고
    • Interposition agents: Transparently interposing user code at the system interface
    • Asheville, NC
    • M. B. Jones. Interposition Agents: Transparently Interposing User Code at the System Interface. In Proceedings of the Symposium on Operating Systems Principles, pages 80-93, Asheville, NC, 1993.
    • (1993) Proceedings of the Symposium on Operating Systems Principles , pp. 80-93
    • Jones, M.B.1
  • 16
    • 0036090464 scopus 로고    scopus 로고
    • Using internal sensors and embedded detectors for intrusion detection
    • F. Kerschbaum, E. H. Spafford, and D. Zamboni. Using Internal Sensors and Embedded Detectors for Intrusion Detection. Journal of Computer Security, 10(1-2):23-70, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 23-70
    • Kerschbaum, F.1    Spafford, E.H.2    Zamboni, D.3
  • 19
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • Oakland, CA, May
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187, Oakland, CA, May 1997.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 20
    • 0006062387 scopus 로고    scopus 로고
    • Generation of application level audit data via library interposition
    • COAST Laboratory, Purdue University, October
    • B. A. Kuperman and E. Spafford. Generation of Application Level Audit Data via Library Interposition. Technical Report CERIAS TR-99-11, COAST Laboratory, Purdue University, October 1999.
    • (1999) Technical Report , vol.CERIAS TR-99-11
    • Kuperman, B.A.1    Spafford, E.2
  • 22
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse with the production-based expert system toolset (P-BEST)
    • Oakland, California, May
    • U. Lindqvist and P. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.2
  • 27
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion and denial of service: Eluding network intrusion detection
    • Secure Networks, January
    • T. Ptacek and T. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, January 1998.
    • (1998) Technical Report
    • Ptacek, T.1    Newsham, T.2
  • 29
    • 0347927191 scopus 로고
    • A toolkit and methods for internet firewalls
    • Boston, MA
    • M. J. Ranum and F. M. Avolio. A Toolkit and Methods for Internet Firewalls. In USENIX Conference, pages 37-44, Boston, MA, 1994.
    • (1994) USENIX Conference , pp. 37-44
    • Ranum, M.J.1    Avolio, F.M.2
  • 30
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Seattle, WA, November
    • M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, Seattle, WA, November 1999.
    • (1999) Proceedings of the USENIX LISA '99 Conference
    • Roesch, M.1
  • 33
    • 77953188431 scopus 로고    scopus 로고
    • Detecting malicious java code using virtual machine auditing
    • Washington, DC
    • S. Soman, C. Krintz, and G. Vigna. Detecting Malicious Java Code Using Virtual Machine Auditing. In Proc. of the 12th USENIX Security Symposium, pages 153-168, Washington, DC, 2003.
    • (2003) Proc. of the 12th USENIX Security Symposium , pp. 153-168
    • Soman, S.1    Krintz, C.2    Vigna, G.3
  • 35
    • 0004042711 scopus 로고    scopus 로고
    • Multiple bypass: Interposition agents for distributed computing
    • March
    • D. Thain and M. Livny. Multiple Bypass: Interposition Agents for Distributed Computing. Journal of Cluster Computing, 4(1):39-47, March 2001.
    • (2001) Journal of Cluster Computing , vol.4 , Issue.1 , pp. 39-47
    • Thain, D.1    Livny, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.