메뉴 건너뛰기




Volumn 5137 LNCS, Issue , 2008, Pages 267-278

A tool for offline and live testing of evasion resilience in network intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; INTERNET; SECURITY OF DATA; SENSORS; SIGNAL DETECTION; SURFACE CHEMISTRY; TELECOMMUNICATION NETWORKS; TESTING;

EID: 49949107014     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70542-0_14     Document Type: Conference Paper
Times cited : (8)

References (16)
  • 2
    • 84899126047 scopus 로고    scopus 로고
    • Active mapping: Resisting NIDS evasion without altering traffic
    • Shankar, U., Paxson, V.: Active mapping: resisting NIDS evasion without altering traffic. In: Proc. Symposium on Security and Privacy, pp. 44-61 (2003)
    • (2003) Proc. Symposium on Security and Privacy , pp. 44-61
    • Shankar, U.1    Paxson, V.2
  • 3
    • 26444591908 scopus 로고    scopus 로고
    • Enhancing the accuracy of network-based intrusion detection with host-based context
    • Julisch, K, Krügel, C, eds, DIMVA 2005, Springer, Heidelberg
    • Dreger, H., Kreibich, C., Paxson, V., Sommer, R.: Enhancing the accuracy of network-based intrusion detection with host-based context. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3548
    • Dreger, H.1    Kreibich, C.2    Paxson, V.3    Sommer, R.4
  • 4
    • 35248863918 scopus 로고    scopus 로고
    • Taleck, G.: Ambiguity Resolution via Passive OS Fingerprinting. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 192-206. Springer, Heidelberg (2003)
    • Taleck, G.: Ambiguity Resolution via Passive OS Fingerprinting. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 192-206. Springer, Heidelberg (2003)
  • 5
    • 85084160972 scopus 로고    scopus 로고
    • Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
    • Handley, M., Paxson, V., Kreibich, C.: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In: Proc. USENIX Security Symposium (2001)
    • (2001) Proc. USENIX Security Symposium
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 6
    • 2442501519 scopus 로고    scopus 로고
    • Protocol Scrubbing: Network Security through Transparent Flow Modification
    • Watson, D., Smart, M., Malan, G.R., Jahanian, F.: Protocol Scrubbing: Network Security through Transparent Flow Modification. IEEE/ACM Transactions on Networking 12(2), 261-273 (2004)
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , Issue.2 , pp. 261-273
    • Watson, D.1    Smart, M.2    Malan, G.R.3    Jahanian, F.4
  • 7
    • 49949097684 scopus 로고    scopus 로고
    • Pang, R., Paxson, V.: A High-Level Programming Environment for Packet. Trace Anonymization and Transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)
    • Pang, R., Paxson, V.: A High-Level Programming Environment for Packet. Trace Anonymization and Transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)
  • 8
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks 31(23-24), 2435-2463 (1999)
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 9
    • 84969805182 scopus 로고    scopus 로고
    • Design and Implementation of Netdude, a Framework for Packet Trace Manipulation
    • Kreibich, C.: Design and Implementation of Netdude, a Framework for Packet Trace Manipulation. In: Proc. USENIX Technical Conference, FREENIX track (2004)
    • (2004) Proc. USENIX Technical Conference, FREENIX track
    • Kreibich, C.1
  • 13
    • 49949094598 scopus 로고    scopus 로고
    • Ptacek, T., Newsham, T.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Inc. (January 1998)
    • Ptacek, T., Newsham, T.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Inc. (January 1998)
  • 15
    • 21644443817 scopus 로고    scopus 로고
    • Rubin, S., Jha, S., Miller, B.: Automatic Generation and Analysis of NIDS Attacks. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 00, pp. 28-38 (2004)
    • Rubin, S., Jha, S., Miller, B.: Automatic Generation and Analysis of NIDS Attacks. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), vol. 00, pp. 28-38 (2004)
  • 16
    • 49949086486 scopus 로고    scopus 로고
    • Marty, R.: Thor - A Tool to Test Intrusion Detection Systems by Variations of Attacks. Master's thesis, Swiss Federal Institute of Technology, Zurich, Switzerland (2002)
    • Marty, R.: Thor - A Tool to Test Intrusion Detection Systems by Variations of Attacks. Master's thesis, Swiss Federal Institute of Technology, Zurich, Switzerland (2002)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.