메뉴 건너뛰기




Volumn 3858 LNCS, Issue , 2006, Pages 102-123

Towards software-based signature detection for intrusion prevention on the network card

Author keywords

Distributed firewall; Network processors

Indexed keywords

ALGORITHMS; COMPUTER CRIME; COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; LOCAL AREA NETWORKS; PROGRAM PROCESSORS; SECURITY OF DATA; TELECOMMUNICATION NETWORKS;

EID: 33745643365     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11663812_6     Document Type: Conference Paper
Times cited : (15)

References (30)
  • 2
    • 0004208503 scopus 로고    scopus 로고
    • Usenix; login:, Special issue on Security
    • Bellovin, S.M,: Distributed firewalls. Usenix; login:, Special issue on Security (1999) 37-39
    • (1999) Distributed Firewalls , pp. 37-39
    • Bellovin, S.M.1
  • 5
    • 77958468530 scopus 로고    scopus 로고
    • Supporting intrusion detection by graph clustering and graph drawing
    • Toulouse, France
    • Toelle, J., Niggemann, O.: Supporting intrusion detection by graph clustering and graph drawing. In: Proc. RAID'00, Toulouse, France (2000)
    • (2000) Proc. RAID'00
    • Toelle, J.1    Niggemann, O.2
  • 9
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Estan, C., Savage, S., Varghese, G.: Automatically inferring patterns of resource consumption in network traffic. In: Proc. of SIGCOMM'03. (2003)
    • (2003) Proc. of SIGCOMM'03
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 10
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM 18 (1975) 333-340
    • (1975) Communications of the ACM , vol.18 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 11
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks 31(23-24) (1999) 2435-2463
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 12
    • 3543096392 scopus 로고    scopus 로고
    • Fast portscan detection using sequential hypothesis testing
    • Oakland, CA
    • Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: IEEE SP'04, Oakland, CA (2004)
    • (2004) IEEE SP'04
    • Jung, J.1    Paxson, V.2    Berger, A.W.3    Balakrishnan, H.4
  • 16
    • 35248828109 scopus 로고    scopus 로고
    • S2I: A tool for automatic rule match compilation for the IXP network processor
    • Vienna, Austria
    • I.Charitakis, D.Pnevmatikatos, E.Markatos, K.Anagnostakis: S2I: a tool for automatic rule match compilation for the IXP network processor. In: SCOPES 2003, Vienna, Austria (2003) 226-239
    • (2003) SCOPES 2003 , pp. 226-239
    • Charitakis, I.1    Pnevmatikatos, D.2    Markatos, E.3    Anagnostakis, K.4
  • 17
    • 14844310820 scopus 로고    scopus 로고
    • TCP offload is a bad idea whose time has come
    • Lihue. Hawaii, USA
    • Mogul, J.: TCP offload is a bad idea whose time has come. In: Proc. of HotOS IX, Lihue. Hawaii, USA (2003)
    • (2003) Proc. of HotOS IX
    • Mogul, J.1
  • 18
    • 8344251916 scopus 로고    scopus 로고
    • Deterministic memory-efficient string matching algorithms for intrusion detection
    • Hong Kong, China
    • Tuck, N., Sherwood, T., Calder, B., Varghese, G..: Deterministic memory-efficient string matching algorithms for intrusion detection. In: Proceedings of IEEE Infocorn, Hong Kong, China (2004)
    • (2004) Proceedings of IEEE Infocorn
    • Tuck, N.1    Sherwood, T.2    Calder, B.3    Varghese, G.4
  • 19
    • 0033890508 scopus 로고    scopus 로고
    • Transport and application protocol scrubbing
    • Tel-Aviv, Israel
    • Malan, R., Watson, D., Jahanian, F., Howell, P.: Transport and application protocol scrubbing. In: Infocom'2000, Tel-Aviv, Israel (2000)
    • (2000) Infocom'2000
    • Malan, R.1    Watson, D.2    Jahanian, F.3    Howell, P.4
  • 20
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Washington, D.C., USA
    • Handley, M., Paxson, V., Kreibich, C.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: USENIX-Sec'2001, Washington, D.C., USA (2001)
    • (2001) USENIX-Sec'2001
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 22
    • 23944487084 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • IBM Research, Zurich
    • Debar, H., Dacier, M., Wepsi, A.: A revised taxonomy for intrusion-detection systems. Technical report, IBM Research, Zurich (1999)
    • (1999) Technical Report
    • Debar, H.1    Dacier, M.2    Wepsi, A.3
  • 26
    • 0343302299 scopus 로고
    • Improving the security of your site by breaking into it
    • Internet White Paper
    • Farmer, D., Venema, W.: Improving the security of your site by breaking into it. Technical report, Internet White Paper (1993) http://www.fish.com/ security/.
    • (1993) Technical Report
    • Farmer, D.1    Venema, W.2
  • 27
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • San Francisco, CA
    • Moore, D., Shannon, C., Voelker, G., Savage, S.: Internet quarantine: Requirements for containing self-propagating code, In: Infocom, San Francisco, CA (2003)
    • (2003) Infocom
    • Moore, D.1    Shannon, C.2    Voelker, G.3    Savage, S.4
  • 28
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks Inc.
    • Ptacek, T.H., Newsham, T.N.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc. (1998)
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 29
    • 33745651405 scopus 로고    scopus 로고
    • Performance adaptation in real-time intrusion detection systems
    • Zurich, Switzerland
    • Lee, W., Cabrera, J.B.D., Thomas, A., Balwalli, N., Saluja, S., Zhang, Y.: Performance adaptation in real-time intrusion detection systems. In: RAID'02, Zurich, Switzerland (2002)
    • (2002) RAID'02
    • Lee, W.1    Cabrera, J.B.D.2    Thomas, A.3    Balwalli, N.4    Saluja, S.5    Zhang, Y.6
  • 30
    • 0009014466 scopus 로고    scopus 로고
    • Using embedded sensors for detecting network attack
    • Purdue University
    • Kerschbaum, F., Spafford, E.H., Zamboni, D.: Using embedded sensors for detecting network attack. Technical report, Purdue University (2000)
    • (2000) Technical Report
    • Kerschbaum, F.1    Spafford, E.H.2    Zamboni, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.