메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 99-106

Privacy-preserving payload-based correlation for accurate malicious traffic detection

Author keywords

Anomaly detection; Distributed intrusion detection; Payload correlation; Privacy preservation; Signature generation

Indexed keywords

ANOMALY DETECTION; DISTRIBUTED INTRUSION DETECTION SYSTEMS (DIDS); PAYLOAD CORRELATION; PRIVACY PRESERVATION; SIGNATURE GENERATION;

EID: 34248345975     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1162666.1162667     Document Type: Conference Paper
Times cited : (24)

References (49)
  • 1
  • 3
    • 85012127915 scopus 로고    scopus 로고
    • Privacy-Preserving Indexing of Documents on the Network
    • M. Bawa, R. J. Bayardo Jr., and R. Agrawal. Privacy-Preserving Indexing of Documents on the Network. In VLDB, 2003.
    • (2003) VLDB
    • Bawa, M.1    Bayardo Jr., R.J.2    Agrawal, R.3
  • 5
    • 0014814325 scopus 로고
    • Space/time trade-offs in Hash Coding with Allowable Errors
    • B. H. Bloom. Space/time trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 13(7):422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 6
    • 8344271981 scopus 로고    scopus 로고
    • Approximate Caches for Packet Classification
    • F. Chang, W.-c. Feng, and K. Li. Approximate Caches for Packet Classification. In IEEE INFOCOM, 2004.
    • (2004) IEEE INFOCOM
    • Chang, F.1    Feng, W.-C.2    Li, K.3
  • 7
    • 84888402098 scopus 로고    scopus 로고
    • The Zombie Roundup: Understanding, Detecting and Disrupting Botnets
    • Cambridge, MA
    • E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting and Disrupting Botnets. In USENIX SRUTI Workshop, Cambridge, MA, 2005.
    • (2005) USENIX SRUTI Workshop
    • Cooke, E.1    Jahanian, F.2    McPherson, D.3
  • 13
    • 0242496951 scopus 로고    scopus 로고
    • Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems
    • W. Du and M. Atallah. Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In New Security Paradigms Workshop, 2001.
    • (2001) New Security Paradigms Workshop
    • Du, W.1    Atallah, M.2
  • 14
    • 33845584959 scopus 로고    scopus 로고
    • Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
    • L. Fan, P. Cao, J. Almeida, and A. Broder. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. In ACM SIGCOMM, 1998.
    • (1998) ACM SIGCOMM
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.4
  • 15
    • 34248368391 scopus 로고    scopus 로고
    • BARTER: Profile Model Exchange for Behavior-based Access Control
    • Technical report, Columbia University, 2006. Submitted to conference
    • V. Frias-Martinez and S. J. Stolfo. BARTER: Profile Model Exchange for Behavior-based Access Control. Technical report, Columbia University, 2006. Submitted to conference.
    • Frias-Martinez, V.1    Stolfo, S.J.2
  • 16
    • 85180415640 scopus 로고    scopus 로고
    • Privacy-Preserving Friends Troubleshooting Network
    • San Diego, CA
    • Q. Huang, H. J. Wang, and N. Borisov. Privacy-Preserving Friends Troubleshooting Network. In NDSS, San Diego, CA, 2005.
    • (2005) NDSS
    • Huang, Q.1    Wang, H.J.2    Borisov, N.3
  • 17
    • 84942121141 scopus 로고    scopus 로고
    • Indra: A peer-to-peer approach to network intrusion detection and prevention
    • R. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: A peer-to-peer approach to network intrusion detection and prevention. In WETICE, 2003.
    • (2003) WETICE
    • Janakiraman, R.1    Waldvogel, M.2    Zhang, Q.3
  • 18
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward Automated, Distributed Worm Signature Detection
    • San Diego, CA
    • H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security Symposium, San Diego, CA, 2004.
    • (2004) USENIX Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 19
    • 38049094878 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • L. Kissner and D. Song. Privacy-Preserving Set Operations. In CRYPTO, 2005.
    • (2005) CRYPTO
    • Kissner, L.1    Song, D.2
  • 21
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - Creating Intrusion Detection Signatures Using Honeypots
    • Boston, MA
    • C. Kreibich and J. Crowcroft. Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. In ACM Workshop on Hot Topics in Networks, Boston, MA, 2003.
    • (2003) ACM Workshop on Hot Topics in Networks
    • Kreibich, C.1    Crowcroft, J.2
  • 24
    • 33745800070 scopus 로고    scopus 로고
    • Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecing Servers
    • Alexandria, VA
    • Z. Liang and R. Sekar. Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecing Servers. In ACM Conference on Computer and Communications Security, Alexandria, VA, 2005.
    • (2005) ACM Conference on Computer and Communications Security
    • Liang, Z.1    Sekar, R.2
  • 25
    • 85084159849 scopus 로고    scopus 로고
    • Privacy-Preserving Sharing and Correlation of Security Alerts
    • P. Lincoln, P. Porras, and V. Shmatikov. Privacy-Preserving Sharing and Correlation of Security Alerts. In USENIX Security, 2004.
    • (2004) USENIX Security
    • Lincoln, P.1    Porras, P.2    Shmatikov, V.3
  • 29
    • 84882740544 scopus 로고    scopus 로고
    • Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software
    • San Diego, CA
    • J. Newsome, D. Brumley, and D. Song. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. In Network and Distributed Security Symposium (NDSS), San Diego, CA, 2006.
    • (2006) Network and Distributed Security Symposium (NDSS)
    • Newsome, J.1    Brumley, D.2    Song, D.3
  • 30
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically Generating Signatures for Polymorphic Worms
    • Oakland, CA
    • J. Newsome, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In IEEE Security and Privacy, Oakland, CA, 2005.
    • (2005) IEEE Security and Privacy
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 31
    • 34248355022 scopus 로고    scopus 로고
    • Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection
    • Technical report
    • J. J. Parekh, K. Wang, and S. J. Stolfo. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection. Technical report, 2006. http://mice.cs.columbia.edu/getTechreport.php?techreportID=409.
    • (2006)
    • Parekh, J.J.1    Wang, K.2    Stolfo, S.J.3
  • 33
    • 34248387582 scopus 로고    scopus 로고
    • H. Project and R. Alliance. Know your Enemy: Tracking Botnets, 3/13/05 2005. http://www.honeynet.org/papers/bots/. [34] S. Singh, C. Estan, G. Varghese, and S. Savage. Automated Worm Fingerprinting. In 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, CA, 2004.
    • H. Project and R. Alliance. Know your Enemy: Tracking Botnets, 3/13/05 2005. http://www.honeynet.org/papers/bots/. [34] S. Singh, C. Estan, G. Varghese, and S. Savage. Automated Worm Fingerprinting. In 6th Symposium on Operating Systems Design and Implementation (OSDI '04), San Francisco, CA, 2004.
  • 36
    • 3042683635 scopus 로고    scopus 로고
    • Worm and Attack Early Warning: Piercing Stealthy Reconnaissance
    • S. J. Stolfo. Worm and Attack Early Warning: Piercing Stealthy Reconnaissance. IEEE Security and Privacy, 2004.
    • (2004) IEEE Security and Privacy
    • Stolfo, S.J.1
  • 38
    • 25844462447 scopus 로고    scopus 로고
    • Defending Against Internet Worms: A Signature-Based Approach
    • Miami, FL
    • Y. Tang and S. Chen. Defending Against Internet Worms: A Signature-Based Approach. In IEEE Infocom, Miami, FL, 2005.
    • (2005) IEEE Infocom
    • Tang, Y.1    Chen, S.2
  • 40
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry Attacks on Host-Based Intrusion Detection Systems
    • D. Wagner and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. In ACM CCS, 2002.
    • (2002) ACM CCS
    • Wagner, D.1    Soto, P.2
  • 41
    • 33750352075 scopus 로고    scopus 로고
    • Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In ACM SIGCOMM, 2004.
    • (2004) ACM SIGCOMM
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4
  • 42
    • 85077048913 scopus 로고    scopus 로고
    • Automatic Misconfiguration Troubleshooting with PeerPressure
    • San Francisco
    • H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI, San Francisco, 2004.
    • (2004) OSDI
    • Wang, H.J.1    Platt, J.C.2    Chen, Y.3    Zhang, R.4    Wang, Y.-M.5
  • 46
    • 33746644985 scopus 로고    scopus 로고
    • Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
    • Tucson, AZ
    • D. Xu and P. Ning. Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. In 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005.
    • (2005) 21st Annual Computer Security Applications Conference
    • Xu, D.1    Ning, P.2
  • 48
    • 85137546697 scopus 로고    scopus 로고
    • Global Intrusion Detection in the DOMINO Overlay System
    • V. Yegneswaran, P. Barford, and S. Jha. Global Intrusion Detection in the DOMINO Overlay System. In NDSS, 2004.
    • (2004) NDSS
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.