메뉴 건너뛰기




Volumn , Issue , 2008, Pages 187-201

XFA: Faster signature matching with extended automata

Author keywords

[No Author keywords available]

Indexed keywords

CHLORINE COMPOUNDS; COMPUTER CRIME; INFORMATION SERVICES; INTERNET; INTRUSION DETECTION; NANOSTRUCTURED MATERIALS; ROBOTS; SECURITY OF DATA; SENSORS; TRANSLATION (LANGUAGES);

EID: 50249130270     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2008.14     Document Type: Conference Paper
Times cited : (169)

References (33)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • June
    • A. V. Aho and M. J. Corasick. Efficient string matching: An aid to bibliographic search. In Communications of the ACM, June 1975.
    • (1975) Communications of the ACM
    • Aho, A.V.1    Corasick, M.J.2
  • 8
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S. T. Eckmann, G. Vigna, and R. A. Kemmerer. STATL: An attack language for state-based intrusion detection. Journal of Computer Security, 10(1/2):71-104, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 9
    • 1542350966 scopus 로고    scopus 로고
    • Fast content-based packet handling for intrusion detection. TR CS2001-0670, UC San Diego
    • May
    • M. Fisk and G. Varghese. Fast content-based packet handling for intrusion detection. TR CS2001-0670, UC San Diego, May 2001.
    • (2001)
    • Fisk, M.1    Varghese, G.2
  • 10
    • 50249162912 scopus 로고    scopus 로고
    • Nondeterministic polynomial time versus nondeterministic logarthmic space: Time-space tradeoffs for satisfiability
    • L. Fortnow. Nondeterministic polynomial time versus nondeterministic logarthmic space: Time-space tradeoffs for satisfiability. In Proceedings of Twelfth IEEE Conference on Computational Complexity, 1997.
    • (1997) Proceedings of Twelfth IEEE Conference on Computational Complexity
    • Fortnow, L.1
  • 11
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • August
    • M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Usenix Security, August 2001.
    • (2001) Usenix Security
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 13
    • 50249084831 scopus 로고    scopus 로고
    • M. Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
    • M. Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
  • 14
    • 38049032244 scopus 로고    scopus 로고
    • Algorithms to accelerate multiple regular expressions matching for deep packet inspection
    • September
    • S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In Proceedings of ACM SIGCOMM, September 2006.
    • (2006) Proceedings of ACM SIGCOMM
    • Kumar, S.1    Dharmapurikar, S.2    Yu, F.3    Crowley, P.4    Turner, J.5
  • 15
    • 79551630961 scopus 로고    scopus 로고
    • A fast string-matching algorithm for network processor-based intrusion detection system
    • R-T Liu, N-F Huang, C-H Chen, and C-N Kao. A fast string-matching algorithm for network processor-based intrusion detection system. Transactions on Embedded Computing Sys., 3(3):614-633, 2004.
    • (2004) Transactions on Embedded Computing Sys , vol.3 , Issue.3 , pp. 614-633
    • Liu, R.-T.1    Huang, N.-F.2    Chen, C.-H.3    Kao, C.-N.4
  • 18
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: a system for detecting network intruders in real-time. In Computer Networks, volume 31, pages 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 19
    • 37249008138 scopus 로고    scopus 로고
    • Insertion, evasion and denial of service: Eluding network intrusion detection
    • January
    • T. Ptacek and T. Newsham. Insertion, evasion and denial of service: Eluding network intrusion detection. In Secure Networks, Inc., January 1998.
    • (1998) Secure Networks, Inc
    • Ptacek, T.1    Newsham, T.2
  • 23
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • August
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Usenix Security, August 1999.
    • (1999) Usenix Security
    • Sekar, R.1    Uppuluri, P.2
  • 30
    • 84945708555 scopus 로고
    • Programming techniques: Regular expression search algorithm
    • K. Thompson. Programming techniques: Regular expression search algorithm. Commun. ACM, 11(6):419-422, 1968.
    • (1968) Commun. ACM , vol.11 , Issue.6 , pp. 419-422
    • Thompson, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.