메뉴 건너뛰기




Volumn , Issue , 2005, Pages 3-17

Language-based generation and evaluation of NIDS signatures

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL REASONING; NIDS SIGNATURES;

EID: 27544472436     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (28)

References (36)
  • 2
    • 0032218204 scopus 로고    scopus 로고
    • Model checking of hierarchical state machines
    • Lake Buena Vista, FL, Nov.
    • R. Alur and M. Yannakakis. Model checking of hierarchical state machines. In Foundations of Software Engineering, Lake Buena Vista, FL, Nov. 1998.
    • (1998) Foundations of Software Engineering
    • Alur, R.1    Yannakakis, M.2
  • 5
    • 84861256733 scopus 로고    scopus 로고
    • BlackMoon Inc. BlackMoon FTP Server. Available at www.blackmoonftpserver. com.
    • BlackMoon FTP Server
  • 7
    • 4544359276 scopus 로고    scopus 로고
    • IBM Zurich Research Laboratory, Aug. Deliverable D10, Project MAFTIA IST-1999-11583
    • M. Dacier, editor. Design of an Intrusion-Tolerant Intrusion Detection System. IBM Zurich Research Laboratory, Aug. 2002. Deliverable D10, Project MAFTIA IST-1999-11583, Available at www.maftia.org.
    • (2002) Design of an Intrusion-tolerant Intrusion Detection System
    • Dacier, M.1
  • 8
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S. T. Eckmann, G. Vigna, and R. A. Kemmerer. STATL: An attack language for state-based intrusion detection. J. Computer Security, 10(1/2), 2002.
    • (2002) J. Computer Security , vol.10 , Issue.1-2
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 10
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Washington, DC, Aug.
    • M. Handley and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In USENIX Security Symposium, Washington, DC, Aug. 2001.
    • (2001) USENIX Security Symposium
    • Handley, M.1    Paxson, V.2
  • 13
    • 23944438303 scopus 로고    scopus 로고
    • Finite-state error/edit-systems and difference-measures for languages and words
    • Saint Mary's University Department of Mathematics and Computing Science
    • L. Kari, S. Konstantinidis, S. Perron, G. Wozniak, and J. Xu. Finite-state error/edit-systems and difference-measures for languages and words. Technical Report 2003_001, Saint Mary's University Department of Mathematics and Computing Science, 2003.
    • (2003) Technical Report , vol.2003 , Issue.1
    • Kari, L.1    Konstantinidis, S.2    Perron, S.3    Wozniak, G.4    Xu, J.5
  • 16
    • 33745180019 scopus 로고    scopus 로고
    • ADeLe: An attack description language for knowledge-based intrusion detection
    • Paris, France, June
    • C. Michel and L. Mé. ADeLe: An attack description language for knowledge-based intrusion detection. In International Conference on Information Security, Paris, France, June 2001.
    • (2001) International Conference on Information Security
    • Michel, C.1    Mé, L.2
  • 19
    • 84903593793 scopus 로고    scopus 로고
    • An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
    • Las Vegas, NV, Dec.
    • D. Mutz, G. Vigna, and R. A. Kemmerer. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems. In Annual Computer Security Applications Conference, Las Vegas, NV, Dec. 2003.
    • (2003) Annual Computer Security Applications Conference
    • Mutz, D.1    Vigna, G.2    Kemmerer, R.A.3
  • 21
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Dec.
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23/24), Dec. 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24
    • Paxson, V.1
  • 24
    • 33847105800 scopus 로고    scopus 로고
    • Formal specification of intrusion signatures and detection rules
    • Nova Scotia, Canada, June
    • J.-P. Pouzol and M. Ducassé. Formal specification of intrusion signatures and detection rules. In IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2002.
    • (2002) IEEE Computer Security Foundations Workshop
    • Pouzol, J.-P.1    Ducassé, M.2
  • 25
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc., Calgary, Alberta, Canada
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical Report T2R-0Y6, Secure Networks, Inc., Calgary, Alberta, Canada, 1998.
    • (1998) Technical Report , vol.T2R-0Y6
    • Ptacek, T.H.1    Newsham, T.N.2
  • 30
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • Washington, DC, Aug.
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In USENIX Security Symposium, Washington, DC, Aug. 1999.
    • (1999) USENIX Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 31
  • 34
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna and R. A. Kemmerer. NetSTAT: A Network-based Intrusion Detection System. J. Computer Security, 7(1), 1999.
    • (1999) J. Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.