메뉴 건너뛰기




Volumn 11, Issue 1, 2005, Pages 83-103

ProtoMon: Embedded monitors for cryptographic protocol intrusion detection and prevention

Author keywords

Computer Security; Cryptographic Protocol Abuse; Intrusion Detection

Indexed keywords


EID: 23844533214     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (29)
  • 1
    • 3042635764 scopus 로고    scopus 로고
    • Identifying Outliers via Clustering for Anomaly Detection
    • [Arshad and Chan 2003] , Dept. of Computer Science, Florida Institute of Technology
    • [Arshad and Chan 2003] M. Arshad, P. Chan, Identifying Outliers via Clustering for Anomaly Detection, Technical Report CS-2003-19, Dept. of Computer Science, Florida Institute of Technology, 2003.
    • (2003) Technical Report , vol.CS-2003-19
    • Arshad, M.1    Chan, P.2
  • 2
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
    • [Bleichenbacher 1998]
    • [Bleichenbacher 1998] D. Bleichenbacher, Chosen Ciphertext Attacks against Protocols based on the RSA Encryption Standard PKCS#1, Proceedings of CRYPTO'98, pp 1-12, 1998.
    • (1998) Proceedings of CRYPTO'98 , pp. 1-12
    • Bleichenbacher, D.1
  • 3
    • 85032541897 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • [Brumley and Boneh 2003]
    • [Brumley and Boneh 2003] D. Brumley, D. Boneh, Remote Timing Attacks are Practical, 12th USENIX Security Symposium, pp. 1-14, 2003.
    • (2003) 12th USENIX Security Symposium , pp. 1-14
    • Brumley, D.1    Boneh, D.2
  • 5
    • 23844534933 scopus 로고    scopus 로고
    • OpenSSL servers contain a buffer overflow during the SSL2 handshake process
    • [CERT 2002a] CERT, July 2002
    • [CERT 2002a] CERT, "OpenSSL servers contain a buffer overflow during the SSL2 handshake process", CERT Vulnerability Note #102795, July 2002.
    • CERT Vulnerability Note #102795
  • 6
    • 23844467959 scopus 로고    scopus 로고
    • OpenSSL servers contain a remotely exploitable buffer overflow vulner-ability during the SSL3 handshake process
    • [CERT 2002b] CERT, July
    • [CERT 2002b] CERT, "OpenSSL servers contain a remotely exploitable buffer overflow vulner-ability during the SSL3 handshake process", CERT Vulnerability Note #561275, July 2002.
    • (2002) CERT Vulnerability Note #561275
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [Dolev and Yao 1983], March
    • [Dolev and Yao 1983] D. Dolev, A. Yao, On the Security of Public Key Protocols, IEEE Transactions on Information Theory, 29(2): 198-208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 10
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their composition
    • [Heintze 1996], January
    • [Heintze 1996] N. Heintze, J.D. Tygar, A Model for Secure Protocols and their Composition, IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 14
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • [Lee and Stolfo 1998]
    • [Lee and Stolfo 1998] W. Lee, S. Stolfo, Data mining Approaches for Intrusion Detection, USENIX Security Symposium, 1998, pp. 79-93.
    • (1998) USENIX Security Symposium , pp. 79-93
    • Lee, W.1    Stolfo, S.2
  • 16
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • [Meadows 1992]
    • [Meadows 1992] C. Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol, Journal of Computer Security, 1:5-53, 1992.
    • (1992) Journal of Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 17
    • 0023295108 scopus 로고
    • The interrogator: Protocol security analysis
    • [Millen et al. 1987] Feb.
    • [Millen et al. 1987] J.K. Millen, S.C. Clark, S.B. Freedman, The interrogator: Protocol Security Analysis, IEEE Transaction Software Engineering, SE-13(2):274-288, Feb. 1987.
    • (1987) IEEE Transaction Software Engineering , vol.SE-13 , Issue.2 , pp. 274-288
    • Millen, J.K.1    Clark, S.C.2    Freedman, S.B.3
  • 19
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • [Needham and Schroeder 1978], December
    • [Needham and Schroeder 1978] R.M. Needham, M.D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of ACM, 21(12):993-999, December 1978.
    • (1978) Communications of ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 22
    • 85084164032 scopus 로고    scopus 로고
    • Automated response using system-call delays
    • [Somayaji and Forrest 2000]
    • [Somayaji and Forrest 2000] A. Somayaji, S. Forrest, Automated Response using System-Call Delays, 9th USENIX Security Symposium, 2000, pp. 185-198.
    • (2000) 9th USENIX Security Symposium , pp. 185-198
    • Somayaji, A.1    Forrest, S.2
  • 23
    • 0032678887 scopus 로고    scopus 로고
    • Athena - An automatic checker for security protocol analysis
    • [Song 1999]
    • [Song 1999] D. Song, Athena - An Automatic Checker for Security Protocol Analysis, Proc. Computer Security Foundation Workshop, 1999, pp. 192-202.
    • (1999) Proc. Computer Security Foundation Workshop , pp. 192-202
    • Song, D.1
  • 24
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • [Staniford et al. 2002]
    • [Staniford et al. 2002] S. Staniford, J. Hoagland, J. McAlerney, "Practical Automated Detection of Stealthy Portscans," Journal of Computer Security, 10(1/2): 105-136, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 105-136
    • Staniford, S.1    Hoagland, J.2    McAlerney, J.3
  • 26
    • 0242456143 scopus 로고    scopus 로고
    • NATE-network analysis of anomalous traffic events, a low-cost approach
    • [Taylor and Alves-Foss 2001], September
    • [Taylor and Alves-Foss 2001] C. Taylor, J. Alves-Foss, NATE-Network Analysis of Anomalous Traffic Events, A Low-cost Approach, Proceedings of the New Security Paradigms Workshop '01, pp 89-96, September 2001.
    • (2001) Proceedings of the New Security Paradigms Workshop '01 , pp. 89-96
    • Taylor, C.1    Alves-Foss, J.2
  • 28
    • 0034593312 scopus 로고    scopus 로고
    • Dynamic analysis of security protocols
    • [Yasinsac 2000], Sept 18-21, Ballycotton, Ireland
    • [Yasinsac 2000] A. Yasinsac, Dynamic Analysis of Security Protocols, Proceedings of New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland, pp. 77-87, 2000.
    • (2000) Proceedings of New Security Paradigms 2000 Workshop , pp. 77-87
    • Yasinsac, A.1
  • 29
    • 0036090428 scopus 로고    scopus 로고
    • An environment for security protocol intrusion detection
    • [Yasinsac 2002]
    • [Yasinsac 2002] A. Yasinsac, An Environment for Security Protocol Intrusion Detection, Journal of Computer Security, 10(1/2): 177-188, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 177-188
    • Yasinsac, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.