메뉴 건너뛰기




Volumn 27, Issue 5-6, 2008, Pages 176-187

Application-based anomaly intrusion detection with dynamic information flow analysis

Author keywords

Cluster filtering; Dynamic information flow analysis; Information flow anomaly detection; Intrusion detection; Profiling

Indexed keywords

COMPUTER SOFTWARE; DYNAMIC PROGRAMMING; JAVA PROGRAMMING LANGUAGE; KETONES; OPEN SYSTEMS; PROGRAM DEBUGGING; PULSATILE FLOW; RELIABILITY;

EID: 53049096535     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.06.002     Document Type: Article
Times cited : (30)

References (38)
  • 2
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information Systems and Security 3 3 (August 2000) 186-205
    • (2000) ACM Transactions on Information Systems and Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 4
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning D.E., and Denning P.J. Certification of programs for secure information flow. Communication of the ACM 20 7 (1977) 504-513
    • (1977) Communication of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 6
    • 0034997451 scopus 로고    scopus 로고
    • Dickinson W, Leon D, Podgurski A. Finding failures by cluster analysis of execution profiles. In: Twenty-third international conference on software engineering, Toronto; May 2001. p. 339-48.
    • Dickinson W, Leon D, Podgurski A. Finding failures by cluster analysis of execution profiles. In: Twenty-third international conference on software engineering, Toronto; May 2001. p. 339-48.
  • 9
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • Fenton J.S. Memoryless subsystems. The Computer Journal 17 2 (1974) 143-147
    • (1974) The Computer Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 14
    • 85086751334 scopus 로고    scopus 로고
    • Leon D, Masri W, Podgurski A. An empirical evaluation of test case filtering techniques based on exercising complex information flows. In: Twenty-seventh international conference on software engineering (St. Louis, MO); May 2005.
    • Leon D, Masri W, Podgurski A. An empirical evaluation of test case filtering techniques based on exercising complex information flows. In: Twenty-seventh international conference on software engineering (St. Louis, MO); May 2005.
  • 15
    • 53049097893 scopus 로고    scopus 로고
    • Liepins G, Vaccaro HS. Anomaly detection: purpose and framework. In: Twelfth national computer security conference (Baltimore); 1989. p. 495-504.
    • Liepins G, Vaccaro HS. Anomaly detection: purpose and framework. In: Twelfth national computer security conference (Baltimore); 1989. p. 495-504.
  • 16
    • 53049092327 scopus 로고    scopus 로고
    • Masri W. Dynamic information flow analysis. Slicing and profiling. Ph.D. dissertation; 2004. http://softlabnet.cwru.edu.
    • Masri W. Dynamic information flow analysis. Slicing and profiling. Ph.D. dissertation; 2004. http://softlabnet.cwru.edu.
  • 17
    • 34547691021 scopus 로고    scopus 로고
    • Masri W, Nahas N, Podgurski A. Memorized forward computation of program slices. In: Seventeenth IEEE international symposium on software reliability engineering, ISSRE 2006. Raleigh, NC, USA; November 2006.
    • Masri W, Nahas N, Podgurski A. Memorized forward computation of program slices. In: Seventeenth IEEE international symposium on software reliability engineering, ISSRE 2006. Raleigh, NC, USA; November 2006.
  • 18
    • 16244362392 scopus 로고    scopus 로고
    • Masri W, Podgurski A, Leon D. Detecting and debugging insecure information flows. In: Fifteenth IEEE international symposium on software reliability engineering, ISSRE 2004, St. Malo, France; November 2-5, 2004.
    • Masri W, Podgurski A, Leon D. Detecting and debugging insecure information flows. In: Fifteenth IEEE international symposium on software reliability engineering, ISSRE 2004, St. Malo, France; November 2-5, 2004.
  • 19
    • 85085405276 scopus 로고    scopus 로고
    • Masri W, Podgurski A. Using dynamic information flow analysis to detect attacks against applications. In: 2005 Workshop on Software Engineering for Security Systems (St. Louis, MI); May 2005.
    • Masri W, Podgurski A. Using dynamic information flow analysis to detect attacks against applications. In: 2005 Workshop on Software Engineering for Security Systems (St. Louis, MI); May 2005.
  • 20
    • 34250772325 scopus 로고    scopus 로고
    • an empirical study of test case filtering techniques based on exercising information flows
    • Masri W., Podgurski A., and Leon D. an empirical study of test case filtering techniques based on exercising information flows. IEEE Transactions on Software Engineering 33 7 (July 2007) 454
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.7 , pp. 454
    • Masri, W.1    Podgurski, A.2    Leon, D.3
  • 21
    • 53049083088 scopus 로고    scopus 로고
    • McCamant S, Ernst M. Quantitative information-flow tracking for C and related languages. MIT computer science and artificial intelligence laboratory technical report MIT-CSAIL-TR-2006-076 (Cambridge, MA); November 17, 2006.
    • McCamant S, Ernst M. Quantitative information-flow tracking for C and related languages. MIT computer science and artificial intelligence laboratory technical report MIT-CSAIL-TR-2006-076 (Cambridge, MA); November 17, 2006.
  • 22
    • 36448929074 scopus 로고    scopus 로고
    • McCamant S, Ernst M. A simulation-based proof technique for dynamic information flow. In: ACM SIGPLAN workshop on programming languages and analysis for security (San Diego, Calfornia, USA); June 14, 2007.
    • McCamant S, Ernst M. A simulation-based proof technique for dynamic information flow. In: ACM SIGPLAN workshop on programming languages and analysis for security (San Diego, Calfornia, USA); June 14, 2007.
  • 23
    • 33646936897 scopus 로고    scopus 로고
    • McMaster S, Memon A. Call stack coverage for test suite reduction. In: Twenty-first international conference on software maintenance, Butapest, Hungary; September 2005.
    • McMaster S, Memon A. Call stack coverage for test suite reduction. In: Twenty-first international conference on software maintenance, Butapest, Hungary; September 2005.
  • 24
    • 53049088604 scopus 로고    scopus 로고
    • Newsome J, Song DX. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Twelfth network and distributed system security symposium, San Diego, California; February 2005.
    • Newsome J, Song DX. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Twelfth network and distributed system security symposium, San Diego, California; February 2005.
  • 25
    • 53049109364 scopus 로고    scopus 로고
    • Orso A, Kennedy B. Selective capture and replay of program executions. In: 2005 Workshop on dynamic analysis (St. Louis); May 2005.
    • Orso A, Kennedy B. Selective capture and replay of program executions. In: 2005 Workshop on dynamic analysis (St. Louis); May 2005.
  • 26
    • 53049108341 scopus 로고    scopus 로고
    • Perl.org. The perl directory, .
    • Perl.org. The perl directory, .
  • 27
    • 0034593043 scopus 로고    scopus 로고
    • Steven S, Chandra P, Fleck B, Podgurski A. jRapture: a capture/replay tool for observation-based testing. In: 2000 international symposium on software testing and analysis (Portland, Oregon); August 2000. p. 158-67.
    • Steven S, Chandra P, Fleck B, Podgurski A. jRapture: a capture/replay tool for observation-based testing. In: 2000 international symposium on software testing and analysis (Portland, Oregon); August 2000. p. 158-67.
  • 28
    • 12844267418 scopus 로고    scopus 로고
    • Suh GE, Lee J, Devadas S. Secure program execution via dynamic information flow tracking. In: Eleventh international conference on architectural support for programming languages and operating systems (Boston, MA); 2004.
    • Suh GE, Lee J, Devadas S. Secure program execution via dynamic information flow tracking. In: Eleventh international conference on architectural support for programming languages and operating systems (Boston, MA); 2004.
  • 30
    • 53049096256 scopus 로고    scopus 로고
    • Tan K, Killourhy K, Maxion R. Undermining an anomaly-based intrusion detection system using common exploits. In: Fifth international symposium on recent advances in intrusion detection (Zurich); October 2002.
    • Tan K, Killourhy K, Maxion R. Undermining an anomaly-based intrusion detection system using common exploits. In: Fifth international symposium on recent advances in intrusion detection (Zurich); October 2002.
  • 32
    • 21644475650 scopus 로고    scopus 로고
    • Vachharajani N, Bridges M, Chang J, Rangan R, Ottoni G, Blome J, Reis G, Vachharajani M, August D. RIFLE: an architectural framework for user-centric information-flow security. In: Proceedings of the 37th international symposium on microarchitecture (MICRO); December 2004.
    • Vachharajani N, Bridges M, Chang J, Rangan R, Ottoni G, Blome J, Reis G, Vachharajani M, August D. RIFLE: an architectural framework for user-centric information-flow security. In: Proceedings of the 37th international symposium on microarchitecture (MICRO); December 2004.
  • 33
    • 53049089626 scopus 로고    scopus 로고
    • Vogt P, Nentwich F, Jovanovic N, Kruegel C, Kirda E, Vigna G. Cross site scripting prevention with dynamic data tainting and static analysis. In: Fourteenth annual network and distributed system security symposium (NDSS 2007), San Diego, CA; February 2007.
    • Vogt P, Nentwich F, Jovanovic N, Kruegel C, Kirda E, Vigna G. Cross site scripting prevention with dynamic data tainting and static analysis. In: Fourteenth annual network and distributed system security symposium (NDSS 2007), San Diego, CA; February 2007.
  • 34
    • 0038011184 scopus 로고    scopus 로고
    • Wagner D, Soto P. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, D.C.; November 2002. p. 255-64.
    • Wagner D, Soto P. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, D.C.; November 2002. p. 255-64.
  • 37
    • 0142219252 scopus 로고    scopus 로고
    • An improved reference flow control model for policy-based intrusion detection
    • Eighth European symposium on research in computer security (Gjøvik, Norway), Springer-Verlag
    • Zimmermann J., Mé L., and Bidan C. An improved reference flow control model for policy-based intrusion detection. Eighth European symposium on research in computer security (Gjøvik, Norway). Lecture notes in computer science 2808 (October 2003), Springer-Verlag
    • (2003) Lecture notes in computer science 2808
    • Zimmermann, J.1    Mé, L.2    Bidan, C.3
  • 38
    • 53049093057 scopus 로고    scopus 로고
    • Zimmermann J, Mé L, Bidan C. Experimenting with a policy-based HIDS based on and information flow control model. In: Nineenteenth computer security applications conference (Las Vegas); November 2003.
    • Zimmermann J, Mé L, Bidan C. Experimenting with a policy-based HIDS based on and information flow control model. In: Nineenteenth computer security applications conference (Las Vegas); November 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.