메뉴 건너뛰기




Volumn 2, Issue 4, 2007, Pages 243-256

Language models for detection of unknown attacks in network traffic

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33846910249     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-006-0030-0     Document Type: Article
Times cited : (73)

References (69)
  • 2
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the Witty worm
    • Shannon, C., Moore, D.: The spread of the Witty worm. IEEE Sec. Priv. 2(4), 46-50 (2004)
    • (2004) IEEE Sec. Priv , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 4
    • 33846933194 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-21: Buffer overflow in telnetd. CERT Coordination Center (2001)
    • CERT Advisory CA-2001-21: Buffer overflow in telnetd. CERT Coordination Center (2001)
  • 5
    • 33846935633 scopus 로고    scopus 로고
    • CERT Advisory CA-2002-28: Openssh vulnerabilities in challenge response handling. CERT Coordination Center (2002)
    • CERT Advisory CA-2002-28: Openssh vulnerabilities in challenge response handling. CERT Coordination Center (2002)
  • 6
    • 0141441130 scopus 로고    scopus 로고
    • PHAD: Packet header anomaly detection for identifying hostile network traffic
    • Technical Report CS-2001-2, Florida Institute of Technology
    • Mahoney, M., Chan, P.: PHAD: packet header anomaly detection for identifying hostile network traffic. Technical Report CS-2001-2, Florida Institute of Technology (2001)
    • (2001)
    • Mahoney, M.1    Chan, P.2
  • 10
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
    • Mahoney, M., Chan, P.: An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: Recent Adances in Intrusion Detection (RAID), 220-237 (2004)
    • (2004) Recent Adances in Intrusion Detection (RAID) , pp. 220-237
    • Mahoney, M.1    Chan, P.2
  • 14
    • 84885774862 scopus 로고    scopus 로고
    • Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Sec. 3, 227-261 (2001)
    • Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Sec. 3, 227-261 (2001)
  • 15
    • 23544449776 scopus 로고    scopus 로고
    • Learning models of network traffic for detecting novel attacks
    • Technical Report CS-2002-8, Florida Institute of Technology
    • Mahoney, M., Chan, P.: Learning models of network traffic for detecting novel attacks. Technical Report CS-2002-8, Florida Institute of Technology (2002)
    • (2002)
    • Mahoney, M.1    Chan, P.2
  • 20
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Hofmeyr, S., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Sec. 6(3), 151-180 (1998)
    • (1998) J. Comput. Sec , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 22
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behavior of a program using multiple-length n-grams
    • Marceau, C.: Characterizing the behavior of a program using multiple-length n-grams. In: Proceedings of New Security Paradigms Workshop (NSPW) 101-110 (2000)
    • (2000) Proceedings of New Security Paradigms Workshop (NSPW) , pp. 101-110
    • Marceau, C.1
  • 26
    • 0002636321 scopus 로고
    • N-gram-based text categorization
    • Las Vegas
    • Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proceedings SDAIR, Las Vegas 161-175 (1994)
    • (1994) Proceedings SDAIR , pp. 161-175
    • Cavnar, W.B.1    Trenkle, J.M.2
  • 27
    • 0028911698 scopus 로고
    • Gauging similarity with n-grams: Language-independent categorization of text
    • Damashek, M.: Gauging similarity with n-grams: language-independent categorization of text. Science 267(5199), 843-848 (1995)
    • (1995) Science , vol.267 , Issue.5199 , pp. 843-848
    • Damashek, M.1
  • 28
    • 0003425660 scopus 로고    scopus 로고
    • Text categorization with support vector machines: Learning with many relevant features
    • Technical Report 23, LS VIII, University of Dortmund
    • Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. Technical Report 23, LS VIII, University of Dortmund (1997)
    • (1997)
    • Joachims, T.1
  • 29
    • 0033640628 scopus 로고    scopus 로고
    • Twenty years of document image analysis in PAMI
    • Nagy, G.: Twenty years of document image analysis in PAMI. IEEE Trans. Pattern Anal. Mach. Intell. 22(1), 36-62 (2000)
    • (2000) IEEE Trans. Pattern Anal. Mach. Intell , vol.22 , Issue.1 , pp. 36-62
    • Nagy, G.1
  • 30
    • 0018446498 scopus 로고
    • Mathematics and information retrieval
    • Salton, G.: Mathematics and information retrieval. J. Doc. 35(1), 1-29 (1979)
    • (1979) J. Doc , vol.35 , Issue.1 , pp. 1-29
    • Salton, G.1
  • 31
    • 0017952955 scopus 로고
    • N-gram statistics for natural language understanding and text processing
    • Suen, C.Y.: N-gram statistics for natural language understanding and text processing. IEEE Trans. Pattern Anal. Mach. Intell. 1(2), 164-172 (1979)
    • (1979) IEEE Trans. Pattern Anal. Mach. Intell , vol.1 , Issue.2 , pp. 164-172
    • Suen, C.Y.1
  • 34
    • 0013080309 scopus 로고
    • Contribution au problème de l'immigration postglaciaire de la flore alpine
    • Jaccard, P.: Contribution au problème de l'immigration postglaciaire de la flore alpine. Bulletin de la Société Vaudoise Des Sciences Naturelles 36, 87-130 (1900)
    • (1900) Bulletin de la Société Vaudoise Des Sciences Naturelles , vol.36 , pp. 87-130
    • Jaccard, P.1
  • 37
    • 84945709825 scopus 로고    scopus 로고
    • Fredkin, E.: Trie memory. Commun. 3(9):490-499: ACM, (1960)
    • Fredkin, E.: Trie memory. Commun. 3(9):490-499: ACM, (1960)
  • 39
    • 33750258120 scopus 로고    scopus 로고
    • Efficient algorithms for similarity measures over sequential data: A look beyond kernels
    • Pattern Recognition, Proceedings of 28th DAGM Symposium
    • Rieck, K., Laskov, R, Müller, K.R.: Efficient algorithms for similarity measures over sequential data: a look beyond kernels. In: Pattern Recognition, Proceedings of 28th DAGM Symposium. LNCS 374-383 (2006)
    • (2006) LNCS , pp. 374-383
    • Rieck, K.1    Laskov, R.2    Müller, K.R.3
  • 40
    • 33846906135 scopus 로고    scopus 로고
    • Computation of similarity measures for sequential data using generalized suffix trees
    • MIT, Cambridge
    • Rieck, K., Laskov, P., Sonnenburg, S.: Computation of similarity measures for sequential data using generalized suffix trees. In: Advances in Neural Information Processing Systems 19, MIT, Cambridge (2006)
    • (2006) Advances in Neural Information Processing Systems , vol.19
    • Rieck, K.1    Laskov, P.2    Sonnenburg, S.3
  • 41
    • 33846894891 scopus 로고    scopus 로고
    • Lazarevic, A., Ertoz, I.,., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection,. In: Proceedings of SIAM International Conference on Data Mining (2003)
    • Lazarevic, A., Ertoz, I.,., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection,. In: Proceedings of SIAM International Conference on Data Mining (2003)
  • 44
    • 33746430492 scopus 로고    scopus 로고
    • Detecting unknown network attacks using language models
    • Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of 3rd DIMVA Conference
    • Rieck, K., Laskov, P.: Detecting unknown network attacks using language models. In: Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of 3rd DIMVA Conference. LNCS, 74-90 (2006)
    • (2006) LNCS , vol.74-90
    • Rieck, K.1    Laskov, P.2
  • 45
    • 0034133513 scopus 로고    scopus 로고
    • Distance-based outliers: Algorithms and applications
    • Knorr, E., Ng, R., Tucakov, V.: Distance-based outliers: algorithms and applications. Int. J. Very Large Data Bases 8(3-4), 237-253 (2000)
    • (2000) Int. J. Very Large Data Bases , vol.8 , Issue.3-4 , pp. 237-253
    • Knorr, E.1    Ng, R.2    Tucakov, V.3
  • 47
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 34(4), 579-595 (2000)
    • (2000) Comput. Netw , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3    Korba, J.4    Das, K.5
  • 49
    • 85019691440 scopus 로고    scopus 로고
    • McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inform. Syst. Sec. 3(4), 262-294 (2000)
    • McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inform. Syst. Sec. 3(4), 262-294 (2000)
  • 52
    • 0036085540 scopus 로고    scopus 로고
    • Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
    • Tan, K., Maxion, R.: "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector. In: Proceedings of IEEE Symposium on Security and Privacy, 188-201 (2002)
    • (2002) Proceedings of IEEE Symposium on Security and Privacy , pp. 188-201
    • Tan, K.1    Maxion, R.2
  • 54
    • 33846940882 scopus 로고    scopus 로고
    • Microsoft: MS00-078-web server folder traversal vulnerability. Microsoft Sec. Bull. (2000)
    • Microsoft: MS00-078-web server folder traversal vulnerability. Microsoft Sec. Bull. (2000)
  • 55
    • 33846918111 scopus 로고    scopus 로고
    • Anonymous: Once upon a free() ... Phrack Magazine 0xb(0x39) (2001) 57-0x09
    • Anonymous: Once upon a free() ... Phrack Magazine 0xb(0x39) (2001) 57-0x09
  • 60
    • 33846932218 scopus 로고    scopus 로고
    • Microsoft: MS05-021- vulnerability in exchange server could allow remote code execution: Microsoft Sec Bull. (2005)
    • Microsoft: MS05-021- vulnerability in exchange server could allow remote code execution: Microsoft Sec Bull. (2005)
  • 62
    • 0032405150 scopus 로고    scopus 로고
    • Applications of n-grams in textual information systems
    • Robertson, A.M., Willett, P.: Applications of n-grams in textual information systems. J. Doc. 58(1), 48-49 (1998)
    • (1998) J. Doc , vol.58 , Issue.1 , pp. 48-49
    • Robertson, A.M.1    Willett, P.2
  • 63
    • 0002531715 scopus 로고    scopus 로고
    • Dynamic alignment kernels
    • Smola, A, Bartlett, P, Schölkopf, B, Schuurmans, D, eds, MIT, Cambridge
    • Watkins, C.: Dynamic alignment kernels. In: Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D., (eds) Advances in large Margin Classifiers, MIT, Cambridge 39-50 (2000)
    • (2000) Advances in large Margin Classifiers , pp. 39-50
    • Watkins, C.1
  • 68
    • 33746882464 scopus 로고    scopus 로고
    • Malware phylogeny generation using permutations of code
    • Karim, M., Walenstein, A., Lakhotia, A., Laxmi, P.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1(1-2), 13-23 (2005)
    • (2005) J. Comput. Virol , vol.1 , Issue.1-2 , pp. 13-23
    • Karim, M.1    Walenstein, A.2    Lakhotia, A.3    Laxmi, P.4
  • 69
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • to appear
    • Kolter, J., Maloof, M.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. (2006) (to appear)
    • (2006) J. Mach. Learn. Res
    • Kolter, J.1    Maloof, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.