메뉴 건너뛰기




Volumn , Issue , 2007, Pages 53-63

Improving signature testing through dynamic data flow analysis

Author keywords

[No Author keywords available]

Indexed keywords

BLACK-BOX TESTING; BLIND SPOTS; COMPUTER SECURITY APPLICATIONS; DIRECT ANALYSIS; DYNAMIC BEHAVIORS; DYNAMIC DATA; INTRUSION DETECTION SYSTEM; NETWORK-BASED INTRUSION DETECTION; NETWORK-BASED INTRUSION DETECTION SYSTEMS; SIGNATURE TESTING; TEST CASES;

EID: 48649105829     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.40     Document Type: Conference Paper
Times cited : (6)

References (30)
  • 2
    • 0020815483 scopus 로고
    • Inductive Inference: Theory and Methods
    • D. Angluin and C. Smith. Inductive Inference: Theory and Methods. ACM Computing Surveys, 15(3), 1983.
    • (1983) ACM Computing Surveys , vol.15 , Issue.3
    • Angluin, D.1    Smith, C.2
  • 9
    • 49949150022 scopus 로고
    • Language Identification in the Limit
    • E. Gold. Language Identification in the Limit. Information and Control, 5(1967), 10.
    • (1967) Information and Control , vol.5 , pp. 10
    • Gold, E.1
  • 11
    • 0005720655 scopus 로고    scopus 로고
    • Defeating Sniffers and Intrusion Detection Systems
    • December
    • horizon. Defeating Sniffers and Intrusion Detection Systems. Phrack Magazine, 8(54), December 1998.
    • (1998) Phrack Magazine , vol.8 , Issue.54
    • horizon1
  • 12
    • 48649099376 scopus 로고    scopus 로고
    • IBM Zurich Research Laboratory
    • IBM Zurich Research Laboratory. Thor. http://www.zurich.ibm.com/csc/ infosec/gsal/past-projects/thor/, 2004.
    • (2004) Thor
  • 17
    • 48649087131 scopus 로고    scopus 로고
    • Metasploit Project
    • Metasploit Project. Metasploit. http://www.metasploit.com/, 2005.
    • (2005) Metasploit
  • 18
  • 20
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
    • Technical report, Secure Networks, January 1998
    • T. Ptacek and T. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, January 1998.
    • Ptacek, T.1    Newsham, T.2
  • 21
    • 48649099236 scopus 로고    scopus 로고
    • R. Graham. SideStep. http://www.robertgraham.com/tmp/sidestep.html, 2005.
    • (2005) SideStep
    • Graham, R.1
  • 23
    • 27544472436 scopus 로고    scopus 로고
    • Language-Based Generation and Evaluation of NIDS Signatures
    • Oakland, California, May
    • S. Rubin, S. Jha, and B. Miller. Language-Based Generation and Evaluation of NIDS Signatures. IEEE Symposium on Security and Privacy, Oakland, California, May, 2005.
    • (2005) IEEE Symposium on Security and Privacy
    • Rubin, S.1    Jha, S.2    Miller, B.3
  • 28
    • 48649088889 scopus 로고    scopus 로고
    • H. Spencer. regex: Regular Expression Library. http://arglist.com/regex/, 2005.
    • H. Spencer. regex: Regular Expression Library. http://arglist.com/regex/, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.