메뉴 건너뛰기




Volumn , Issue , 2008, Pages 96-110

Efficient and robust TCP stream normalization

Author keywords

[No Author keywords available]

Indexed keywords

BYTE STREAMS; HIGH SPEEDS; HIGH-SPEED LINKS; NETWORK ELEMENTS; NETWORK INTRUSION DETECTION; NETWORK MONITORING; NETWORK TRAFFICS; ORDERS-OF-MAGNITUDE; RETRANSMISSIONS; SECURITY AND PRIVACY; SEQUENCE NUMBERS; SOUND DETECTION;

EID: 50249136649     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2008.27     Document Type: Conference Paper
Times cited : (30)

References (20)
  • 1
    • 0003539116 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • November
    • M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proc. USENIX LISA, November 1999.
    • (1999) Proc. USENIX LISA
    • Roesch, M.1
  • 2
    • 0033295259 scopus 로고    scopus 로고
    • V. Paxson, Bro: a System for Detecting Network Intruders in Real-Time, Computer Networks, 31, no. 23-24, pp. 2435.2463, 1999.
    • V. Paxson, "Bro: a System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, no. 23-24, pp. 2435.2463, 1999.
  • 3
    • 50249086150 scopus 로고    scopus 로고
    • T. H. Ptacek and T. N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc., Tech. Rep., Jan. 1998, http://insecure.org/stf/secnet_ids/secnet_ids.html.
    • T. H. Ptacek and T. N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection," Secure Networks, Inc., Tech. Rep., Jan. 1998, http://insecure.org/stf/secnet_ids/secnet_ids.html.
  • 5
    • 85084160972 scopus 로고    scopus 로고
    • Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
    • Aug
    • M. Handley, V. Paxson, and C. Kreibich, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," in Proc. USENIX Security Symposium, Aug. 2001.
    • (2001) Proc. USENIX Security Symposium
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 6
    • 61749084944 scopus 로고    scopus 로고
    • Detecting Evasion Attacks at High Speeds Without Reassembly
    • Sept
    • G. Varghese, J. A. Fingerhut, and F. Bonomi, "Detecting Evasion Attacks at High Speeds Without Reassembly," in Proc. ACM SIGCOMM, Sept. 2006.
    • (2006) Proc. ACM SIGCOMM
    • Varghese, G.1    Fingerhut, J.A.2    Bonomi, F.3
  • 7
    • 84889160249 scopus 로고    scopus 로고
    • fragroute
    • Dug Song, "fragroute," http://monkey.org/~dugsong/fragroute/.
    • Song, D.1
  • 11
    • 14844312929 scopus 로고    scopus 로고
    • Operational Experiences with High-Volume Network Intrusion Detection
    • H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, "Operational Experiences with High-Volume Network Intrusion Detection," in Proceedings of CCS, 2004.
    • (2004) Proceedings of CCS
    • Dreger, H.1    Feldmann, A.2    Paxson, V.3    Sommer, R.4
  • 12
    • 39749145622 scopus 로고    scopus 로고
    • Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines
    • Sept
    • F. Bonomi, M. Mitzenmacher, R. Panigrah, S. Singh, and G. Varghese, "Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines," in Proc. ACM SIGCOMM, Sept. 2006.
    • (2006) Proc. ACM SIGCOMM
    • Bonomi, F.1    Mitzenmacher, M.2    Panigrah, R.3    Singh, S.4    Varghese, G.5
  • 17
    • 50249113579 scopus 로고    scopus 로고
    • _, "Configuring TCP Normalization," 2006, http://www.cisco.com/ en/US/products/ps6120/products_configuration_guide_chapter09186a008054ecb8. html#wp1051891.
    • (2006) Configuring TCP Normalization
    • Systems, C.1
  • 19
    • 14844303748 scopus 로고    scopus 로고
    • On the Difficulty of Scalably Detecting Network Attacks
    • Oct
    • K. Levchenko, R. Paturi, and G. Varghese, "On the Difficulty of Scalably Detecting Network Attacks," in Proc. ACM CCS, Oct. 2004.
    • (2004) Proc. ACM CCS
    • Levchenko, K.1    Paturi, R.2    Varghese, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.