메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 188-196

Characterizing sources and remedies for packet loss in network intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

GENERAL-PURPOSE WORKSTATIONS; NETWORK INTRUSION DETECTION SYSTEMS (NIDS); PACKET LOSSES; SYSTEM OPTIMIZATIONS;

EID: 33749063636     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IISWC.2005.1526016     Document Type: Conference Paper
Times cited : (16)

References (22)
  • 3
    • 84981174482 scopus 로고
    • Experiences with a high-speed network adaptor: A software perspective
    • ACM CS Press, New York, N.Y.
    • P. Druschel, L. Peterson, and B. Davie, "Experiences with a High-speed Network Adaptor: A Software Perspective," Proc. ACM SIGCOMM Conf., ACM CS Press, New York, N.Y., pp. 2-13, 1994.
    • (1994) Proc. ACM SIGCOMM Conf. , pp. 2-13
    • Druschel, P.1    Peterson, L.2    Davie, B.3
  • 4
    • 1542492179 scopus 로고    scopus 로고
    • Trapeze/IP: TCP/IP at near-gigabit speeds
    • Usenix Assoc., Berkeley, Calif.
    • A. Gallatin, J. Chase, and K. Yocum, "Trapeze/IP: TCP/IP at Near-Gigabit Speeds," Proc. 1999 Usenix Technical Conference, Usenix Assoc., Berkeley, Calif., 1999, pp. 109-120.
    • (1999) Proc. 1999 Usenix Technical Conference , pp. 109-120
    • Gallatin, A.1    Chase, J.2    Yocum, K.3
  • 6
    • 0037957323 scopus 로고    scopus 로고
    • The AMD opteron processor for multiprocessor servers
    • IEEE CS Press, Los Alamitos, Calif.
    • C. Keltcher, K. McGrath, A. Ahmed, and P. Conway, "The AMD Opteron Processor for Multiprocessor Servers," IEEE Micro, IEEE CS Press, Los Alamitos, Calif., vol. 23, no. 2, pp. 66-76, 2003.
    • (2003) IEEE Micro , vol.23 , Issue.2 , pp. 66-76
    • Keltcher, C.1    McGrath, K.2    Ahmed, A.3    Conway, P.4
  • 7
    • 35248819234 scopus 로고    scopus 로고
    • Using decision trees to improve signature-based intrusion detection
    • Springer-Verlag, Berlin-Heidelberg-New York
    • C. Kruegel and T. Toth, "Using Decision Trees to Improve Signature-based Intrusion Detection," Proc. Sixth Int'l Symp. Recent Advances in Intrusion Detection (RAID), Springer-Verlag, Berlin-Heidelberg-New York, pp. 173-191, 2003.
    • (2003) Proc. Sixth Int'l Symp. Recent Advances in Intrusion Detection (RAID) , pp. 173-191
    • Kruegel, C.1    Toth, T.2
  • 8
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • Usenix Assoc., Berkeley, Calif.
    • W. Lee and S, Stolfo, "Data Mining Approaches for Intrusion Detection," USENIX Security Symp., Usenix Assoc., Berkeley, Calif., 1998.
    • (1998) USENIX Security Symp.
    • Lee, W.1    Stolfo, S.2
  • 9
    • 0344551104 scopus 로고    scopus 로고
    • Profiling interrupt handler performance through kernel instrumentation
    • IEEE CS Press, Los Alamitos, Calif
    • B. Moore, T. Slabach and L. Schaelicke "Profiling Interrupt Handler Performance through Kernel Instrumentation," Proc. Int'l Conf. Computer Design (ICCD), IEEE CS Press, Los Alamitos, Calif, 2003, pp. 156-163.
    • (2003) Proc. Int'l Conf. Computer Design (ICCD) , pp. 156-163
    • Moore, B.1    Slabach, T.2    Schaelicke, L.3
  • 10
    • 84903593793 scopus 로고    scopus 로고
    • An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
    • D. Mutz, G. Vigna, and R.A. Kemmerer, "An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems," Proc. Ann. Comp. Security Applications Conference (ACSAC), pp. 374-383, 2003.
    • (2003) Proc. Ann. Comp. Security Applications Conference (ACSAC) , pp. 374-383
    • Mutz, D.1    Vigna, G.2    Kemmerer, R.A.3
  • 11
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time", Computer Networks, vol. 31, no. 23-24, 1999, pp. 2435-2463.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 12
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc.
    • T. Ptacek and T. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, " tech. report, Secure Networks, Inc., 1998.
    • (1998) Tech. Report
    • Ptacek, T.1    Newsham, T.2
  • 13
    • 0001214789 scopus 로고    scopus 로고
    • A methodology for testing intrusion detection systems
    • IEEE CS Press, Los Alamitos, Calif.
    • N. Puketza, K. Zhang, M. Chung, B. Mukherjee and R. Olsson, "A Methodology for Testing Intrusion Detection Systems," IEEE Trans. Software Engineering, IEEE CS Press, Los Alamitos, Calif., vol. 22", no. 10, 1996, pp. 719-729.
    • (1996) IEEE Trans. Software Engineering , vol.22 , Issue.10 , pp. 719-729
    • Puketza, N.1    Zhang, K.2    Chung, M.3    Mukherjee, B.4    Olsson, R.5
  • 17
    • 12444292669 scopus 로고    scopus 로고
    • tech. report TR 02-10, Dept. Computer Science Engineering, Univ. of Notre Dame, Notre Dame, In.
    • L. Schaelicke, M. Parker, ML-RSIM Reference Manual, tech. report TR 02-10, Dept. Computer Science Engineering, Univ. of Notre Dame, Notre Dame, In., 2002.
    • (2002) ML-RSIM Reference Manual
    • Schaelicke, L.1    Parker, M.2
  • 19
    • 2442505048 scopus 로고    scopus 로고
    • whitepaper, Sourcefire Network Security Inc.
    • "Snort 2.0 - Detection Revisited," whitepaper, Sourcefire Network Security Inc., 2002.
    • (2002) Snort 2.0 - Detection Revisited
  • 20
    • 84859289762 scopus 로고    scopus 로고
    • tcpdump/libpacp, http://www.tcpdump.org.
  • 21
    • 85084160699 scopus 로고    scopus 로고
    • LMBench: Portable tools for performance analysis
    • Usenix Assoc., Berkeley, Calif.
    • L. McVoy and C. Staelin, "LMBench: Portable Tools for Performance Analysis," Proc. USENIX Annual Technical Conference, Usenix Assoc., Berkeley, Calif., 1996, pp. 279-294.
    • (1996) Proc. USENIX Annual Technical Conference , pp. 279-294
    • McVoy, L.1    Staelin, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.