메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 81-88

Protomon: Embedded monitors for cryptographic protocol intrusion detection and prevention

Author keywords

[No Author keywords available]

Indexed keywords

DATA COLLECTION; INTRUSION DETECTION SYSTEM (IDS); PROTOCOL ATTACKS; PROTOCOL SESSIONS;

EID: 3042550802     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITCC.2004.1286430     Document Type: Conference Paper
Times cited : (13)

References (28)
  • 3
    • 3042635764 scopus 로고    scopus 로고
    • Identifying outliers via clustering for anomaly detection
    • Dept. of Computer Science, Florida Institute of Technology
    • M. Arshad, P. Chan, Identifying Outliers via Clustering for Anomaly Detection, Technical Report CS-2003-19, Dept. of Computer Science, Florida Institute of Technology, 2003.
    • (2003) Technical Report , vol.CS-2003-19
    • Arshad, M.1    Chan, P.2
  • 6
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R.M. Needham, M.D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of ACM, 21(12):993-999, December 1978.
    • (1978) Communications of ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 7
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev, A. Yao, On the Security of Public Key Protocols, IEEE Transactions on Information Theory, 29(2): 198-208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 9
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol, Journal of Computer Security, 1:5-53, 1992.
    • (1992) Journal of Computer Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 10
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the needham-schroeder public key protocol using FDR, tools and algorithms for the construction and analysis of systems
    • Springer-Verlag
    • G. Lowe, Breaking and Fixing the Needham-Schroeder Public Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems, Volume 1055 of Lecture Notes in Computer Science, pp. 147-156, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-156
    • Lowe, G.1
  • 12
    • 0032678887 scopus 로고    scopus 로고
    • Athena - An automatic checker for security protocol analysis
    • Mordano, Italy, June
    • D. Song, Athena - An Automatic Checker for Security Protocol Analysis, Proc. Computer Security Foundation Workshop, Mordano, Italy, June 1999.
    • (1999) Proc. Computer Security Foundation Workshop
    • Song, D.1
  • 14
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their composition
    • January
    • N. Heintze, J.D. Tygar, A Model for Secure Protocols and their Composition, IEEE Transactions on Software Engineering, 22(1): 16-30, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 15
    • 0034593312 scopus 로고    scopus 로고
    • Dynamic analysis of security protocols
    • Sept 18-21, Ballycotton, Ireland
    • A. Yasinsac, Dynamic Analysis of Security Protocols, Proceedings of New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland, pp. 77-87, 2000.
    • (2000) Proceedings of New Security Paradigms 2000 Workshop , pp. 77-87
    • Yasinsac, A.1
  • 16
    • 0036090428 scopus 로고    scopus 로고
    • An environment for security protocol intrusion detection
    • January
    • A. Yasinsac, An Environment for Security Protocol Intrusion Detection, Journal of Computer Security, January 2002.
    • (2002) Journal of Computer Security
    • Yasinsac, A.1
  • 18
    • 3042682609 scopus 로고    scopus 로고
    • PortSentry, by Psionic Technologies
    • PortSentry, by Psionic Technologies.
  • 20
    • 84862384608 scopus 로고    scopus 로고
    • The LaBrea Project, Sourceforge, http://labrea.sourceforge.net.
  • 24
    • 3042644464 scopus 로고    scopus 로고
    • V. Klima, O. Pokorny, T. Rosa, Czech Technical University in Prague, 2003
    • V. Klima, O. Pokorny, T. Rosa, Czech Technical University in Prague, 2003.
  • 25
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
    • D. Bleichenbacher, Chosen Ciphertext Attacks against Protocols based on the RSA Encryption Standard PKCS#1, Proceedings of CRYPTO'98, pp 1-12, 1998.
    • (1998) Proceedings of CRYPTO'98 , pp. 1-12
    • Bleichenbacher, D.1
  • 27
    • 3042541187 scopus 로고    scopus 로고
    • OpenSSL servers contain a buffer overflow during the SSL2 handshake process
    • July
    • CERT Vulnerability Note, " OpenSSL servers contain a buffer overflow during the SSL2 handshake process", July 2002.
    • (2002) CERT Vulnerability Note
  • 28
    • 23844467959 scopus 로고    scopus 로고
    • OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process
    • July
    • CERT Vulnerability Note, " OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake process", July 2002.
    • (2002) CERT Vulnerability Note


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.