메뉴 건너뛰기




Volumn 4064 LNCS, Issue , 2006, Pages 74-90

Detecting unknown network attacks using language models

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; DATA STRUCTURES; FEATURE EXTRACTION; HTTP; INTERNET; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 33746430492     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11790754_5     Document Type: Conference Paper
Times cited : (49)

References (51)
  • 2
    • 33746389745 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT: Advisory CA-2001-21: Buffer overflow in telnetd. CERT Coordination Center (2001)
    • (2001) Buffer Overflow in Telnetd
  • 4
    • 33846294027 scopus 로고    scopus 로고
    • Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
    • To appear
    • Liang, Z., Sekar, R.: Automatic generation of buffer overflow attack signatures: An approach based on program behavior models. In: Proc. ACSAC. (2005) To appear.
    • (2005) Proc. ACSAC
    • Liang, Z.1    Sekar, R.2
  • 5
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Proc. RAID. (2005)
    • (2005) Proc. RAID
    • Kruegel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 6
    • 35048883095 scopus 로고    scopus 로고
    • A model for the semantics of attack signatures in misuse detection systems
    • Meier, M.: A model for the semantics of attack signatures in misuse detection systems. In: Proc. ISC. (2004) 158-169
    • (2004) Proc. ISC , pp. 158-169
    • Meier, M.1
  • 7
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • Eckmann, S., Vigna, G., Kemmerer, R.: STATL: An attack language for state-based intrusion detection. Journal of Computer Security 10(1/2) (2002) 71-104
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 8
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V.: Bro: a system for detecting network intruders in real-time. In: Proc. USENIX. (1998) 31-51
    • (1998) Proc. USENIX , pp. 31-51
    • Paxson, V.1
  • 9
    • 33750351545 scopus 로고    scopus 로고
    • Anomalous payload-based worm detection and signature generation
    • Wang, K., Cretu, G., Stolfo, S.: Anomalous payload-based worm detection and signature generation. In: Proc. RAID. (2005)
    • (2005) Proc. RAID
    • Wang, K.1    Cretu, G.2    Stolfo, S.3
  • 10
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In: Proc. RAID. (2004) 203-222
    • (2004) Proc. RAID , pp. 203-222
    • Wang, K.1    Stolfo, S.2
  • 11
    • 0036038437 scopus 로고    scopus 로고
    • Service specific anomaly detection for network intrusion detection
    • Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proc. Symposium on Applied Computing. (2002) 201-208
    • (2002) Proc. Symposium on Applied Computing , pp. 201-208
    • Kruegel, C.1    Toth, T.2    Kirda, E.3
  • 12
    • 10844237614 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
    • Mahoney, M., Chan, P.: An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: Proc. RAID. (2004) 220-237
    • (2004) Proc. RAID , pp. 220-237
    • Mahoney, M.1    Chan, P.2
  • 13
    • 0141441130 scopus 로고    scopus 로고
    • PHAD: Packet header anomaly detection for identifying hostile network traffic
    • Florida Institute of Technology
    • Mahoney, M., Chan, P.: PHAD: Packet header anomaly detection for identifying hostile network traffic. Technical Report CS-2001-2, Florida Institute of Technology (2001)
    • (2001) Technical Report , vol.CS-2001-2
    • Mahoney, M.1    Chan, P.2
  • 15
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3 (2001) 227-261
    • (2001) ACM Transactions on Information and System Security , vol.3 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 16
    • 23544449776 scopus 로고    scopus 로고
    • Learning models of network traffic for detecting novel attacks
    • Florida Institute of Technology
    • Mahoney, M., Chan, P.: Learning models of network traffic for detecting novel attacks. Technical Report CS-2002-8, Florida Institute of Technology (2002)
    • (2002) Technical Report , vol.CS-2002-8
    • Mahoney, M.1    Chan, P.2
  • 17
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • Mahoney, M.: Network traffic anomaly detection based on packet bytes. In: Proc. ACM Symposium on Applied Computing. (2003) 346-350
    • (2003) Proc. ACM Symposium on Applied Computing , pp. 346-350
    • Mahoney, M.1
  • 22
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behavior of a program using multiple-length n-grams
    • Marceau, C.: Characterizing the behavior of a program using multiple-length n-grams. In: Proc. NSPW. (2000) 101-110
    • (2000) Proc. NSPW , pp. 101-110
    • Marceau, C.1
  • 23
    • 0002365658 scopus 로고    scopus 로고
    • Learning program behavior profiles for intrusion detection
    • Santa Clara, CA, USA
    • Ghosh, A., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proc. USENIX, Santa Clara, CA, USA (1999) 51-62
    • (1999) Proc. USENIX , pp. 51-62
    • Ghosh, A.1    Schwartzbard, A.2    Schatz, M.3
  • 24
    • 84964540406 scopus 로고    scopus 로고
    • Modeling system calls for intrusion detection with dynamic window sizes
    • Eskin, E., Lee, W., Stolfo, S.: Modeling system calls for intrusion detection with dynamic window sizes. In: Proc. DISCEX. (2001)
    • (2001) Proc. DISCEX
    • Eskin, E.1    Lee, W.2    Stolfo, S.3
  • 25
    • 0028911698 scopus 로고
    • Gauging similarity with n-grams: Language-independent categorization of text
    • Damashek, M.: Gauging similarity with n-grams: Language-independent categorization of text. Science 267(5199) (1995) 843-848
    • (1995) Science , vol.267 , Issue.5199 , pp. 843-848
    • Damashek, M.1
  • 27
  • 30
    • 0000250265 scopus 로고
    • Measure of the amount of ecologic association between species
    • Dice, L.: Measure of the amount of ecologic association between species. Ecology 26(3) (1945) 297-302
    • (1945) Ecology , vol.26 , Issue.3 , pp. 297-302
    • Dice, L.1
  • 33
    • 32344452166 scopus 로고    scopus 로고
    • A comparative study of anomaly detection schemes in network intrusion detection
    • Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection,. In: Proc. SIAM. (2003)
    • (2003) Proc. SIAM
    • Lazarevic, A.1    Ertoz, L.2    Kumar, V.3    Ozgur, A.4    Srivastava, J.5
  • 34
    • 85016684916 scopus 로고    scopus 로고
    • Intrusion detection in unlabeled data with quarter-sphere support vector machines
    • Laskov, P., Schäfer, C., Kotenko, I.: Intrusion detection in unlabeled data with quarter-sphere support vector machines. In: Proc. DIMVA. (2004) 71-82
    • (2004) Proc. DIMVA , pp. 71-82
    • Laskov, P.1    Schäfer, C.2    Kotenko, I.3
  • 35
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34(4) (2000) 579-595
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3    Korba, J.4    Das, K.5
  • 36
    • 0242445762 scopus 로고    scopus 로고
    • The 1998 Lincoln Laboratory IDS evaluation
    • McHugh, J.: The 1998 Lincoln Laboratory IDS evaluation. In: Proc. RAID. (2000) 145-161
    • (2000) Proc. RAID , pp. 145-161
    • McHugh, J.1
  • 37
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. on Information Systems Security 3(4) (2000) 262-294
    • (2000) ACM Trans. on Information Systems Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 40
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proc. LISA. (1999) 229-238
    • (1999) Proc. LISA , pp. 229-238
    • Roesch, M.1
  • 42
    • 0017952955 scopus 로고
    • N-gram statistics for natural language understanding and text processing
    • Suen, C.Y.: N-gram statistics for natural language understanding and text processing. IEEE Trans. Pattern Analysis and Machine Intelligence 1(2) (1979) 164-172
    • (1979) IEEE Trans. Pattern Analysis and Machine Intelligence , vol.1 , Issue.2 , pp. 164-172
    • Suen, C.Y.1
  • 43
    • 0002636321 scopus 로고
    • N-gram-based text categorization
    • Las Vegas, NV, USA
    • Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proc. SDAIR, Las Vegas, NV, USA. (1994) 161-175
    • (1994) Proc. SDAIR , pp. 161-175
    • Cavnar, W.B.1    Trenkle, J.M.2
  • 44
    • 0032405150 scopus 로고    scopus 로고
    • Applications of n-grams in textual information systems
    • Robertson, A.M., Willett, P.: Applications of n-grams in textual information systems. Journal of Documentation 58(1) (1998) 48-69
    • (1998) Journal of Documentation , vol.58 , Issue.1 , pp. 48-69
    • Robertson, A.M.1    Willett, P.2
  • 45
    • 0002531715 scopus 로고    scopus 로고
    • Dynamic alignment kernels
    • Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D., eds., Cambridge, MA, MIT Press
    • Watkins, C.: Dynamic alignment kernels. In Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D., eds.: Advances in Large Margin Classifiers, Cambridge, MA, MIT Press (2000) 39-50
    • (2000) Advances in Large Margin Classifiers , pp. 39-50
    • Watkins, C.1
  • 46
    • 0036358995 scopus 로고    scopus 로고
    • The spectrum kernel: A string kernel for SVM protein classification
    • Leslie, C., Eskin, E., Noble, W.: The spectrum kernel: A string kernel for SVM protein classification. In: Proc. Pacific Symp. Biocomputing. (2002) 564-575
    • (2002) Proc. Pacific Symp. Biocomputing , pp. 564-575
    • Leslie, C.1    Eskin, E.2    Noble, W.3
  • 47
    • 0002774999 scopus 로고    scopus 로고
    • Learning patterns from unix process execution traces for intrusion detection
    • Providence, RI, USA
    • Lee, W., Stolfo, S., Chan, P.: Learning patterns from unix process execution traces for intrusion detection. In: Proc. AAAI workshop on Fraud Detection and Risk Management, Providence, RI, USA (1997) 50-56
    • (1997) Proc. AAAI Workshop on Fraud Detection and Risk Management , pp. 50-56
    • Lee, W.1    Stolfo, S.2    Chan, P.3
  • 48
    • 84942248748 scopus 로고    scopus 로고
    • Finding the vocabulary of program behavior data for anomaly detection
    • Michael, C.: Finding the vocabulary of program behavior data for anomaly detection. In: Proc. DISCEX. (2003) 152-163
    • (2003) Proc. DISCEX , pp. 152-163
    • Michael, C.1
  • 49
    • 84943817322 scopus 로고
    • Error-detecting and error-correcting codes
    • Hamming, R.W.: Error-detecting and error-correcting codes. Bell System Technical Journal 29(2) (1950) 147-160
    • (1950) Bell System Technical Journal , vol.29 , Issue.2 , pp. 147-160
    • Hamming, R.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.