메뉴 건너뛰기




Volumn 4219 LNCS, Issue , 2006, Pages 311-330

SafeCard: A gigabit IPS on the network card

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; NETWORK PROTOCOLS; PACKET SWITCHING; SIGNAL FILTERING AND PREDICTION; TELECOMMUNICATION LINKS; TELECOMMUNICATION NETWORKS;

EID: 33750307577     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11856214_16     Document Type: Conference Paper
Times cited : (14)

References (36)
  • 2
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Washington, D.C., USA
    • Handley, M., Paxson, V., Kreibich, C.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: USENIX-Sec'2001, Washington, D.C., USA (2001)
    • (2001) USENIX-sec'2001
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 11
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D.C. Du Varney and R. Sekar: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: In Proc. of the 12th USENIX Security Symposium. (2003) 105-120
    • (2003) Proc. of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    Du Varney, D.C.2    Sekar, R.3
  • 15
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • Las Vegas, Nevada
    • Williamson, M.M.: Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In: Proc. of ACSAC Security Conference, Las Vegas, Nevada (2002)
    • (2002) Proc. of ACSAC Security Conference
    • Williamson, M.M.1
  • 16
    • 70349144635 scopus 로고    scopus 로고
    • Using generalization and characterization techniques in the anomaly-based detection of web attacks
    • Robertson, W., Vigna, G., Kruegel, C., Kemmerer, R.: Using generalization and characterization techniques in the anomaly-based detection of web attacks. In: NDSS'05. (2005)
    • (2005) NDSS'05
    • Robertson, W.1    Vigna, G.2    Kruegel, C.3    Kemmerer, R.4
  • 22
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing stackguard and stackshield
    • bulba and Kil3r
    • bulba and Kil3r: Bypassing Stackguard and Stackshield. Phrack Magazine 10 (2000)
    • (2000) Phrack Magazine , vol.10
  • 23
    • 34748842480 scopus 로고    scopus 로고
    • Advances in format string exploitation
    • gera, riq
    • gera, riq: Advances in format string exploitation. Phrack Magazine 11 (2002)
    • (2002) Phrack Magazine , vol.11
  • 24
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Alexandria, VA, USA
    • Liang, Z., Sekar, R.: Fast and automated generation of attack signatures: A basis for building self-protecting servers. In: Proc. ACM CCS, Alexandria, VA, USA (2005) 213-223
    • (2005) Proc. ACM CCS , pp. 213-223
    • Liang, Z.1    Sekar, R.2
  • 25
    • 33746389292 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Seattle, USA
    • Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Proc. of RAID'05, Seattle, USA (2005)
    • (2005) Proc. of RAID'05
    • Kruegel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 27
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks 31(23-24) (1999) 2435-2463
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 29
    • 24944498220 scopus 로고    scopus 로고
    • Fpl-3: Towards language support for distributed packet processing
    • Proceedings of IFIP Networking, published as ISBN: 3-540-25809-4, Waterloo, Ontario, Canada
    • Cristea, M., de Bruijn, W., Bos, H.: Fpl-3: towards language support for distributed packet processing. In: Proceedings of IFIP Networking, published as LNCS Volume 3462 / 2005, ISBN: 3-540-25809-4, Waterloo, Ontario, Canada (2005) p.743-755
    • (2005) LNCS Volume 3462 / 2005 , pp. 743-755
    • Cristea, M.1    De Bruijn, W.2    Bos, H.3
  • 30
    • 0033890508 scopus 로고    scopus 로고
    • Transport and application protocol scrubbing
    • Tel-Aviv, Israel
    • Malan, R., Watson, D., Jahanian, F., Howell, P.: Transport and application protocol scrubbing. In: Infocom'2000, Tel-Aviv, Israel (2000)
    • (2000) Infocom'2000
    • Malan, R.1    Watson, D.2    Jahanian, F.3    Howell, P.4
  • 31
    • 84964467051 scopus 로고    scopus 로고
    • NFAs with tagged transitions, their conversion to deterministic automata and application to regular expressions
    • Laurikari, V.: NFAs with tagged transitions, their conversion to deterministic automata and application to regular expressions. In: SPIRE. (2000) 181-187
    • (2000) SPIRE , pp. 181-187
    • Laurikari, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.