메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 78-82

The use of distributed network-based IDS systems in detection of evasion attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33750993204     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AICT.2005.90     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 1
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion
    • January
    • - Insertion, Evasion, and Denial of Service: Eluding Network Intrusion, Thomas H.Ptacek, Timothy N. Newsham, January, 1998, Secure Networks Inc. white paper
    • (1998) Secure Networks Inc. White Paper
    • Ptacek, T.H.1    Newsham, T.N.2
  • 2
    • 33750982534 scopus 로고
    • Internet Protocol, September Information Sciences Institute, Editor: Jon Postel
    • - RFC 791, Internet Protocol, September 1981, Information Sciences Institute, Editor: Jon Postel
    • (1981) RFC , vol.791
  • 3
    • 33750982846 scopus 로고
    • Transmission Control Protocol, September
    • -RFC 793, Transmission Control Protocol, September 1981, Information Sciences Institute, Editor: Jon Postel
    • (1981) RFC , vol.793
  • 6
    • 0003368396 scopus 로고    scopus 로고
    • An architecture for intrusion detection using autonomous agents
    • COAST Laboratory, Purdue University
    • - An Architecture for Intrusion Detection using Autonomous Agents, Jai Sundar Balasubramaniyan, et al., 1998, COAST Technical Report 98/05, COAST Laboratory, Purdue University
    • (1998) COAST Technical Report , vol.98 , Issue.5
    • Balasubramaniyan, J.S.1
  • 8
    • 2542546808 scopus 로고    scopus 로고
    • A survey of commercial tools for intrusion detection
    • Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden
    • - A survey of commercial tools for intrusion detection, Håkan Kvarnström, Technical Report 99-8, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden, 1999
    • (1999) Technical Report , vol.99 , Issue.8
    • Kvarnström, H.1
  • 9
    • 33750994754 scopus 로고    scopus 로고
    • A strict anomoly detection model for ids, sasha / beetle
    • - A Strict Anomoly Detection Model For Ids, sasha / beetle, PHRACK Magazine No 56, www.phrack.org
    • PHRACK Magazine No 56 , vol.56
  • 14
    • 0012405865 scopus 로고
    • A fast algorithm for multi-pattern searching
    • University of Arizona
    • - S. Wu and U. Manber. A fast algorithm for multi-pattern searching. Technical Report TR-94-17, University of Arizona, 1994.
    • (1994) Technical Report , vol.TR-94-17
    • Wu, S.1    Manber, U.2
  • 15
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • June
    • - Alfred V. Aho and Margaret J. Corasick. Efficient string matching: An aid to bibliographic search. Communications of the ACM 18(6):333-340, June 1975
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 16
    • 0017547820 scopus 로고
    • A fast string searching algorithm
    • October
    • - R. Boyer and J. Moore. A fast string searching algorithm. Commun. ACM, 20(10):762-772, October 1977.
    • (1977) Commun. ACM , vol.20 , Issue.10 , pp. 762-772
    • Boyer, R.1    Moore, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.