메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1473-1478

The strength of syntax based approaches to dynamic network intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER WORMS; WIRELESS NETWORKS;

EID: 44049107617     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2006.286697     Document Type: Conference Paper
Times cited : (2)

References (11)
  • 2
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Amsterdam, Netherlands
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, Amsterdam, Netherlands, 31 (23-24): 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 3
    • 31844451490 scopus 로고    scopus 로고
    • Collaborative distributed intrusion detection
    • Tech Report CUCS-012-04, Department of Computer Science, Columbia University
    • M. Locasto, J. Parekh, S. Stolfo, A. Keromytis, T. Malkin, and V. Misra. Collaborative distributed intrusion detection. Tech Report CUCS-012-04, Department of Computer Science, Columbia University, 2004.
    • (2004)
    • Locasto, M.1    Parekh, J.2    Stolfo, S.3    Keromytis, A.4    Malkin, T.5    Misra, V.6
  • 4
    • 84892612179 scopus 로고    scopus 로고
    • An effective architecture and algorithm for detecting worms with various scan techniques
    • L. Gao, J. Wu, S. Vangala, and K. Kwiat. An effective architecture and algorithm for detecting worms with various scan techniques. Proceedings of NDSS, 2004.
    • (2004) Proceedings of NDSS
    • Gao, L.1    Wu, J.2    Vangala, S.3    Kwiat, K.4
  • 7
    • 0003676885 scopus 로고
    • Fingerprinting by Random Polynomials
    • Tech. Rep. TR-15-81, Center for Research in Computing Technology, Harvard University
    • M. O. Rabin, Fingerprinting by Random Polynomials, Tech. Rep. TR-15-81, Center for Research in Computing Technology, Harvard University, 1981.
    • (1981)
    • Rabin, M.O.1
  • 8
    • 0000369806 scopus 로고
    • Some applications of Rabin's fingerprinting method
    • Renato Capocelli, Alfredo De Santis, and Ugo Vaccaro editors, Springer-Verlag
    • A. Broder. Some applications of Rabin's fingerprinting method. In Renato Capocelli, Alfredo De Santis, and Ugo Vaccaro editors, Sequences II: Methods in Communications, Security, and Computer Science, pages 143-152. Springer-Verlag, 1993.
    • (1993) Sequences II: Methods in Communications, Security, and Computer Science , pp. 143-152
    • Broder, A.1
  • 9
    • 44049101788 scopus 로고    scopus 로고
    • K2. ADMmutate 0.8.4. Published online at http://www.ktwo.ca/ADMmutate-0. 8.4.tar.gz. Last accessed on 6 Jan. 2006.
    • K2. ADMmutate 0.8.4. Published online at http://www.ktwo.ca/ADMmutate-0. 8.4.tar.gz. Last accessed on 6 Jan. 2006.
  • 11
    • 0002619432 scopus 로고
    • Binary codes capable of correcting spurious insertions and deletions of ones
    • V.I. Levenshtein, Binary codes capable of correcting spurious insertions and deletions of ones, Problems of Information Transmission, 1:8-17, 1965.
    • (1965) Problems of Information Transmission , vol.1 , pp. 8-17
    • Levenshtein, V.I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.