메뉴 건너뛰기




Volumn , Issue , 2008, Pages 151-160

Anatomy of a real-time intrusion prevention system

Author keywords

[No Author keywords available]

Indexed keywords

AUTONOMIC COMPUTING; INTERNATIONAL CONFERENCES; INTRUSION PREVENTION SYSTEM;

EID: 51649104949     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAC.2008.24     Document Type: Conference Paper
Times cited : (15)

References (39)
  • 2
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
    • August
    • R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications," Proc. of the USENIX Security Symposium, August 1999.
    • (1999) Proc. of the USENIX Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 4
    • 0023294428 scopus 로고
    • An Intrusion-Detection Model
    • February
    • D. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 222-232, February 1987.
    • (1987) IEEE Transactions on Software Engineering , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 5
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion Detection Using Sequences of System Calls
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 10
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • January
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. of the USENIX Security Symposium, January 1998.
    • (1998) Proc. of the USENIX Security Symposium
    • Paxson, V.1
  • 13
    • 0030092390 scopus 로고    scopus 로고
    • Checking for Race Conditions in File Accesses
    • M. Bishop and M. Dilger, "Checking for Race Conditions in File Accesses," Computing Systems, vol. 9, no. 2, pp. 131-152, 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 15
    • 84928016636 scopus 로고    scopus 로고
    • The Base-Rate Fallacy and the Difficulty of Intrusion Detection
    • Aug
    • S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection," ACM Transactions on Information System Security, vol. 3, no. 3, pp. 186-205, Aug. 2000.
    • (2000) ACM Transactions on Information System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 16
    • 0028514027 scopus 로고
    • A Taxonomy of Computer Program Security Flaws
    • September
    • C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A Taxonomy of Computer Program Security Flaws," ACM Computing Surveys, vol. 26, no. 3, pp. 211-254, September 1994.
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1    Bull, A.R.2    McDermott, J.P.3    Choi, W.S.4
  • 18
    • 0003411763 scopus 로고
    • University of California, Davis Technical Report CSE-9510
    • May
    • M. Bishop, "A Taxonomy of Unix System and Network Vulnerabilities," University of California, Davis Technical Report CSE-9510, May 1995.
    • (1995)
    • Bishop, M.1
  • 20
    • 51649115328 scopus 로고    scopus 로고
    • Security Focus, BZip2 CHMod File Permission Modification Race Condition Weakness, http://www.securityfocus.com/bid/12954/, 2005.
    • Security Focus, "BZip2 CHMod File Permission Modification Race Condition Weakness," http://www.securityfocus.com/bid/12954/, 2005.
  • 21
    • 51649118374 scopus 로고    scopus 로고
    • Wojciech Purczynski / cliph / jwp@elzabsoft.pl, Exploit for execve/ptrace race condition in Linux kernel up to 2.2.19, 2001.
    • Wojciech Purczynski / cliph / jwp@elzabsoft.pl, "Exploit for execve/ptrace race condition in Linux kernel up to 2.2.19,", 2001.
  • 22
    • 51649116031 scopus 로고    scopus 로고
    • Security Focus, GNU Tar Hostile Destination Path Variant Vulnerability, http://www.securityfocus.com/bid/5834/, 2002.
    • Security Focus, "GNU Tar Hostile Destination Path Variant Vulnerability," http://www.securityfocus.com/bid/5834/, 2002.
  • 23
    • 51649124031 scopus 로고    scopus 로고
    • F-Secure, F-Secure Virus Descriptions: Tornkit, http://www.fsecure.com/v-descs/torn.shtml, 2001.
    • F-Secure, "F-Secure Virus Descriptions: Tornkit," http://www.fsecure.com/v-descs/torn.shtml, 2001.
  • 24
    • 51649097919 scopus 로고    scopus 로고
    • Security Focus, X. Org X Window Server Local Privilege Escalation Vulnerability, http://www.securityfocus.com/bid/17169/, 2006.
    • Security Focus, "X. Org X Window Server Local Privilege Escalation Vulnerability," http://www.securityfocus.com/bid/17169/, 2006.
  • 25
    • 0030677523 scopus 로고    scopus 로고
    • Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach
    • May
    • C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach," Proc. of the IEEE Symposium on Security and Privacy, May 1997.
    • (1997) Proc. of the IEEE Symposium on Security and Privacy
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 31
    • 33750340695 scopus 로고    scopus 로고
    • Behavioral Distance for Intrusion Detection
    • September
    • D. Gao, M. K. Reiter, and D. Song, "Behavioral Distance for Intrusion Detection," in Proc. of RAID 2005, September 2006.
    • (2006) Proc. of RAID 2005
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 35
    • 84885774862 scopus 로고    scopus 로고
    • A Framework for Constructing Features and Models for Intrusion Detection Systems
    • W. Lee and S. J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," ACM Transactions on Information and Systems Security, vol. 3, no. 4, pp. 227-261, 2000.
    • (2000) ACM Transactions on Information and Systems Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 38
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An Attack Language for State-based Intrusion Detection
    • S. T. Eckmann, G. Vigna, and R. A. Kemmerer, "STATL: An Attack Language for State-based Intrusion Detection," Journal of Computer Security, vol. 10, no. 1/2, pp. 71-104, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.