메뉴 건너뛰기




Volumn 4637 LNCS, Issue , 2007, Pages 42-62

Comparing anomaly detection techniques for HTTP

Author keywords

Anomaly detection; Comparison; HTTP; Hypertext transport protocol; Intrusion detection

Indexed keywords

ACCESS CONTROL; ALGORITHMS; DATA REDUCTION; NETWORK PROTOCOLS; TEXT PROCESSING;

EID: 38149142569     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74320-0_3     Document Type: Conference Paper
Times cited : (94)

References (40)
  • 1
    • 38149098216 scopus 로고    scopus 로고
    • accessed September 13, 2006
    • Apple Computer: Tunneling RTSP and RTP over HTTP (2006) (accessed September 13, 2006), http://developer.apple.com/documentation/QuickTime/QTSS/ Concepts/chapter-2.section.14. html
    • Apple Computer: Tunneling RTSP and RTP over HTTP
  • 3
    • 38149057897 scopus 로고    scopus 로고
    • Booth, D., Haas, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture. Technical Report W3C Working Group Note 11 February 2004, World Wide Web Consortium (W3C) (2004) (accessed 2007-04-05), online at http://www.w3.org/TR/ws-arch/
    • Booth, D., Haas, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture. Technical Report W3C Working Group Note 11 February 2004, World Wide Web Consortium (W3C) (2004) (accessed 2007-04-05), online at http://www.w3.org/TR/ws-arch/
  • 5
    • 38149103866 scopus 로고    scopus 로고
    • Corporation, M.: Common vulnerabilities and exposures (accessed June 16, 2006), http://eve.mitre.org/
    • Corporation, M.: Common vulnerabilities and exposures (accessed June 16, 2006), http://eve.mitre.org/
  • 6
    • 38149001244 scopus 로고    scopus 로고
    • Curry, D., Debar, H.: Intrusion detection message exchange format data model and extensible markup language (XML) document type definition (December 2002) (accessed January 1, 2003), http://www.ietf.org/internet-drafts/draft- ietf-idwg-idmef-xml-09.txt
    • Curry, D., Debar, H.: Intrusion detection message exchange format data model and extensible markup language (XML) document type definition (December 2002) (accessed January 1, 2003), http://www.ietf.org/internet-drafts/draft- ietf-idwg-idmef-xml-09.txt
  • 7
    • 38149140620 scopus 로고    scopus 로고
    • cve.mitre.org: CVE-1999-0107 (July 1999) (accessed September 3, 2006), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0107
    • cve.mitre.org: CVE-1999-0107 (July 1999) (accessed September 3, 2006), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0107
  • 8
    • 38149009321 scopus 로고    scopus 로고
    • cve.mitre.org: CVE-1999-1199 (September 2004) (accessed October 30, 2005), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE=1999-1199
    • cve.mitre.org: CVE-1999-1199 (September 2004) (accessed October 30, 2005), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE=1999-1199
  • 9
    • 0028911698 scopus 로고
    • Gauging similarity with n-grams: Language-independent categorization of text
    • Damashek, M.: Gauging similarity with n-grams: language-independent categorization of text. Science 267(5199), 843-848 (1995)
    • (1995) Science , vol.267 , Issue.5199 , pp. 843-848
    • Damashek, M.1
  • 11
    • 2542563730 scopus 로고    scopus 로고
    • An experimentation workbench for intrusion detection systems
    • 6519, IBM Research Division, Zurich Research Laboratory, 8803 Rüuschlikon, Switzerland September
    • Debar, H., Dacier, M., Wespi, A., Lampart, S.: An experimentation workbench for intrusion detection systems. Technical Report RZ 6519, IBM Research Division, Zurich Research Laboratory, 8803 Rüuschlikon, Switzerland (September 1998)
    • (1998) Technical Report RZ
    • Debar, H.1    Dacier, M.2    Wespi, A.3    Lampart, S.4
  • 15
    • 33644961664 scopus 로고    scopus 로고
    • DARPA intrusion detection system evaluation: Design and procedures
    • Technical Report TR-1062, Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA, USA February
    • Haines, J.W., Lippmann, R.P., Fried, D.J., Tran, E., Boswell, S., Zissman, M.A.: 1999 DARPA intrusion detection system evaluation: Design and procedures. Technical Report TR-1062, Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA, USA (February 2001)
    • (1999)
    • Haines, J.W.1    Lippmann, R.P.2    Fried, D.J.3    Tran, E.4    Boswell, S.5    Zissman, M.A.6
  • 17
    • 38149081854 scopus 로고    scopus 로고
    • Heberlein, L.: Network security monitor (NSM)-final report. Technical report, University of California at Davis Computer Security Lab, Lawrence Livermore National Laboratory project deliverable (1995), http://seclab.cs. ucdavis.edu/papers/NSM-final.pdf
    • Heberlein, L.: Network security monitor (NSM)-final report. Technical report, University of California at Davis Computer Security Lab, Lawrence Livermore National Laboratory project deliverable (1995), http://seclab.cs. ucdavis.edu/papers/NSM-final.pdf
  • 21
    • 33846369107 scopus 로고    scopus 로고
    • Learning DFA representations of HTTP for protecting web applications
    • Ingham, K.L., Somayaji, A., Burge, J., Forrest, S.: Learning DFA representations of HTTP for protecting web applications. Computer Networks 51(5), 1239-1255 (2007)
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1239-1255
    • Ingham, K.L.1    Somayaji, A.2    Burge, J.3    Forrest, S.4
  • 23
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5), 717-738 (2005)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 24
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34(4), 579-595 (2000)
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3    Korba, J.4    Das, K.5
  • 27
    • 84944239811 scopus 로고    scopus 로고
    • McHugh, J.: The 1998 Lincoln Laboratory IDS evaluation - a critique. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, 1907, pp. 145-161. Springer, Heidelberg (2000)
    • McHugh, J.: The 1998 Lincoln Laboratory IDS evaluation - a critique. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 145-161. Springer, Heidelberg (2000)
  • 28
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and Systems Security 3(4), 262-294 (2000)
    • (2000) ACM Transactions on Information and Systems Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 29
    • 38149123005 scopus 로고    scopus 로고
    • Microsoft Corporation:, accessed Sept 13, 2006
    • Microsoft Corporation: Exchange server 2003 RPC over HTTP deployment scenarios (2006) (accessed Sept 13, 2006), http://www.microsoft.com/ technetprodtechnol/exchange/2003/library/ex2k3rpc.mspx
    • Exchange server 2003 RPC over HTTP deployment scenarios
  • 30
    • 3643079262 scopus 로고    scopus 로고
    • A software platform for testing intrusion detection systems
    • Puketza, N., Chung, M., Olsson, R., Mukherjee, B.: A software platform for testing intrusion detection systems. IEEE Software 14(5), 43-51 (1997)
    • (1997) IEEE Software , vol.14 , Issue.5 , pp. 43-51
    • Puketza, N.1    Chung, M.2    Olsson, R.3    Mukherjee, B.4
  • 33
    • 0002297358 scopus 로고
    • Hidden Markov Model induction by bayesian model merging
    • Hanson, S.J, Cowan, J.D, Giles, C.L, eds, Morgan Kaufmann, San Mateo, CA
    • Stoicke, A., Omohundro, S.: Hidden Markov Model induction by bayesian model merging. In: Hanson, S.J., Cowan, J.D., Giles, C.L. (eds.) Advances in Neural Information Processing Systems, vol. 5, pp. 11-18. Morgan Kaufmann, San Mateo, CA (1993)
    • (1993) Advances in Neural Information Processing Systems , vol.5 , pp. 11-18
    • Stoicke, A.1    Omohundro, S.2
  • 34
    • 0003615076 scopus 로고
    • Best-first model merging for hidden Markov model induction
    • Technical Report TR-94-003, International Computer Science Institute, Center Street, Suite 600, Berkeley, CA, 94704-1198
    • Stolcke, A., Omohundro, S.M.: Best-first model merging for hidden Markov model induction. Technical Report TR-94-003, International Computer Science Institute, 1947 Center Street, Suite 600, Berkeley, CA, 94704-1198 (1994)
    • (1994) , pp. 1947
    • Stolcke, A.1    Omohundro, S.M.2
  • 36
    • 38149067161 scopus 로고    scopus 로고
    • Vargiya, R., Chan, P.: Boundary detection in tokenizing network application payload for anomaly detection. In: Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC). Workshop held in conjunction with The Third IEEE International Conference on Data Mining, November 2003, pp. 50-59 (2003) (accessed April 5, 2006), available at http://www.cs.fit.edu/~pkc/ dmsec03/dmsec03notes.pdf
    • Vargiya, R., Chan, P.: Boundary detection in tokenizing network application payload for anomaly detection. In: Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC). Workshop held in conjunction with The Third IEEE International Conference on Data Mining, November 2003, pp. 50-59 (2003) (accessed April 5, 2006), available at http://www.cs.fit.edu/~pkc/ dmsec03/dmsec03notes.pdf
  • 37
    • 51049097774 scopus 로고    scopus 로고
    • IntruDetector: A software platform for testing network intrusion detection algorithms
    • New Orleans, LA, USA, December 10-14, IEEE Computer Society, Los Alamitos, CA, USA
    • Wan, T., Yang, X.D.: IntruDetector: a software platform for testing network intrusion detection algorithms. In: Seventeenth Annual Computer Security Applications Conference, New Orleans, LA, USA, December 10-14, 2001, IEEE Computer Society, Los Alamitos, CA, USA (2001)
    • (2001) Seventeenth Annual Computer Security Applications Conference
    • Wan, T.1    Yang, X.D.2
  • 38
    • 35048885009 scopus 로고    scopus 로고
    • Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 203-222. Springer, Heidelberg (2004)
    • Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
  • 39
    • 0032639421 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • IEEE Computer Society Press, Los Alamitos
    • Warrender, C., Forrest, S., Pearlmutter, B.A.: Detecting intrusions using system calls: Alternative data models. In: IEEE Symposium on Security and Privacy, pp. 133-145. IEEE Computer Society Press, Los Alamitos (1999)
    • (1999) IEEE Symposium on Security and Privacy , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.A.3
  • 40
    • 38149140619 scopus 로고    scopus 로고
    • accessed September 13, 2006
    • Wiers, D.: Tunneling SSH over HTTP(S) (2006) (accessed September 13, 2006), http://dag.wieers.com/howto/ssh-http-tunneling/
    • Tunneling SSH over HTTP(S)
    • Wiers, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.