메뉴 건너뛰기




Volumn 2004, Issue , 2004, Pages 194-208

Formalizing sensitivity in static analysis for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

DYCK MODEL; HOST-BASED INTRUSION DETECTION SYSTEMS (HIDS); PUSHDOWN AUTOMATA (PDA); RUN-TIME MONITORING;

EID: 3543086916     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (129)

References (27)
  • 1
    • 0003555938 scopus 로고
    • Context-free grammars and pushdown storage
    • Massachusetts Institute of Technology Research Laboratory of Electronics, April
    • N. Chomsky. Context-free grammars and pushdown storage. In Quarterly Progress Report No. 65, pages 187-194. Massachusetts Institute of Technology Research Laboratory of Electronics, April 1962.
    • (1962) Quarterly Progress Report No. 65 , vol.65 , pp. 187-194
    • Chomsky, N.1
  • 6
    • 85084162795 scopus 로고    scopus 로고
    • Detecting manipulated remote call streams
    • San Francisco, California, August
    • J. Giffin, S. Jha, and B. Miller. Detecting manipulated remote call streams. In 11th USENIX Security Symposium, San Francisco, California, August 2002.
    • (2002) 11th USENIX Security Symposium
    • Giffin, J.1    Jha, S.2    Miller, B.3
  • 8
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection system using sequences of system calls
    • S. Hofmeyr, A. Somayaji, and S. Forrest. Intrusion detection system using sequences of system calls. Journal of Computer Security, 6(3):151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.1    Somayaji, A.2    Forrest, S.3
  • 10
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. Kemmerer, and P. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 11
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • Orlando, Florida, December
    • C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilities in privileged programs by execution monitoring. In 10th Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, December 1994.
    • (1994) 10th Annual Computer Security Applications Conference (ACSAC)
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 12
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • August
    • T. Lane and C. Brodley. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2(3):295-331, August 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.2
  • 14
    • 84940104123 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • Oakland, California, May
    • W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, Oakland, California, May 1999.
    • (1999) IEEE Symposium on Security and Privacy
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 15
    • 0003111439 scopus 로고
    • Automated audit trail analysis and intrusion detection: A survey
    • Baltimore, Maryland, October
    • T. Lunt. Automated audit trail analysis and intrusion detection: A survey, In 11th National Computer Security Conference (NCSC), Baltimore, Maryland, October 1988.
    • (1988) 11th National Computer Security Conference (NCSC)
    • Lunt, T.1
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), December 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24
    • Paxson, V.1
  • 17
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks Inc., January
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January 1998. http://www.aciri.org/vem/Ptacek-Newsham-Evasion-98.ps.
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 18
    • 3042546934 scopus 로고    scopus 로고
    • Ph.D. dissertation, Technische Universität München, June
    • S. Schwoon. Model-Checking Pushdown Systems. Ph.D. dissertation, Technische Universität München, June 2002.
    • (2002) Model-checking Pushdown Systems
    • Schwoon, S.1
  • 20
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • Zurich, Switzerland, October. Springer-Verlag
    • K. Tan, K. Killourhy, and R. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In Recent Advances in Intrusion Detection (RAID) 2002, LNCS #2516, pages 54-73, Zurich, Switzerland, October 2002. Springer-Verlag.
    • (2002) Recent Advances in Intrusion Detection (RAID) 2002, LNCS #2516 , vol.2516 , pp. 54-73
    • Tan, K.1    Killourhy, K.2    Maxion, R.3
  • 21
    • 35248821244 scopus 로고    scopus 로고
    • Hiding intrusions: From the abnormal to the normal and beyond
    • Noordwijkerhout, Netherlands, October. Springer-Verlag
    • K. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In 5th International Workshop on Information Hiding, LNCS #2578, Noordwijkerhout, Netherlands, October 2002. Springer-Verlag.
    • (2002) 5th International Workshop on Information Hiding, LNCS #2578 , vol.2578
    • Tan, K.1    McHugh, J.2    Killourhy, K.3
  • 22
    • 0024984441 scopus 로고
    • Adaptive real-time anomaly detection using inductively generated sequential patterns
    • Oakland, California, May
    • H. Teng, K. Chen, and S.-Y. Lu. Adaptive real-time anomaly detection using inductively generated sequential patterns. In IEEE Symposium on Security and Privacy, Oakland, California, May 1990.
    • (1990) IEEE Symposium on Security and Privacy
    • Teng, H.1    Chen, K.2    Lu, S.-Y.3
  • 27
    • 84944248021 scopus 로고    scopus 로고
    • Intrusion detection using variable-length audit trail patterns
    • Toulouse, France, October. Springer-Verlag
    • A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable-length audit trail patterns. In Recent Advances in Intrusion Detection (RAID) 2000, LNCS #1907, pages 110-129, Toulouse, France, October 2000. Springer-Verlag.
    • (2000) Recent Advances in Intrusion Detection (RAID) 2000, LNCS #1907 , vol.1907 , pp. 110-129
    • Wespi, A.1    Dacier, M.2    Debar, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.