메뉴 건너뛰기




Volumn , Issue , 2008, Pages 911-918

Detection of anomalous network packets using lightweight stateless payload inspection

Author keywords

Anomaly detection; Network intrusion detection

Indexed keywords

COMPUTER NETWORKS; COMPUTERS; HARDWARE; INTERNET; LEARNING SYSTEMS; MACHINE COMPONENTS; METROPOLITAN AREA NETWORKS; SIGNAL DETECTION;

EID: 58049125337     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2008.4664303     Document Type: Conference Paper
Times cited : (12)

References (28)
  • 2
    • 58049125272 scopus 로고    scopus 로고
    • APHRODITE: An Anomaly-based Architecture for False Positive Reduction
    • Technical Report TR-CTIT-06-13 Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
    • D. Bolzoni, and S. Etalle, APHRODITE: an Anomaly-based Architecture for False Positive Reduction, Technical Report TR-CTIT-06-13 Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625, 2006.
    • (2006)
    • Bolzoni, D.1    Etalle, S.2
  • 5
    • 33847617890 scopus 로고    scopus 로고
    • M. Hussein, and M. Zulkernine, Intrusion detection aware component-based systems: A specification-based framework, Journal of Systems and Software 80, 5 (May. 2007), pp. 700-710. DOI=http://dx.doi.org/10.1016/j. jss.2006.08.017.
    • M. Hussein, and M. Zulkernine, Intrusion detection aware component-based systems: A specification-based framework, Journal of Systems and Software 80, 5 (May. 2007), pp. 700-710. DOI=http://dx.doi.org/10.1016/j. jss.2006.08.017.
  • 6
    • 33750343827 scopus 로고    scopus 로고
    • Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic
    • Vancouver, BC, Canada
    • O. Kolesnikov, D. Dagon, and W. Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic, in USENIX Security Symposium. 2006: Vancouver, BC, Canada.
    • (2006) USENIX Security Symposium
    • Kolesnikov, O.1    Dagon, D.2    Lee, W.3
  • 7
    • 0036038437 scopus 로고    scopus 로고
    • Service Specific Anomaly Detection for Network Intrusion Detection
    • ACM Digital Library, Spain, Mar
    • C. Kruegel, T. Toth, and E. Kirda, Service Specific Anomaly Detection for Network Intrusion Detection, Symp. on Applied Computing (SAC), ACM Digital Library, Spain, Mar 2002.
    • (2002) Symp. on Applied Computing (SAC)
    • Kruegel, C.1    Toth, T.2    Kirda, E.3
  • 8
    • 84885774862 scopus 로고    scopus 로고
    • A Framework for Constructing Features and Models for Intrusion Detection Systems
    • November
    • W. Lee and S. Stolfo, A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Trans on Information and System Security, vol.3, no.4, pp. 227-261, November 2000.
    • (2000) ACM Trans on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 9
    • 58049104867 scopus 로고    scopus 로고
    • LinkLogger, http://www.linklogger.com/.
    • LinkLogger
  • 16
    • 34248377875 scopus 로고    scopus 로고
    • SVision: A novel visual network-anomaly identification technique
    • May
    • I. Onuta, and A. Ghorbani, SVision: A novel visual network-anomaly identification technique, Computers & Security, vol. 26, Issue 3, pp 201-212, May 2007.
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 201-212
    • Onuta, I.1    Ghorbani, A.2
  • 17
    • 58049118370 scopus 로고    scopus 로고
    • T.H. Ptacek and T. N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc., Jan 1998, http://www.snort.org/idspaper/.
    • T.H. Ptacek and T. N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc., Jan 1998, http://www.snort.org/idspaper/.
  • 19
    • 15944362838 scopus 로고    scopus 로고
    • Detecting Malicious Codes by the presence of their Gene of Self-Replication, Computer Network Security
    • Springer
    • V. Skormin, D. Summerville, J. Moronski, Detecting Malicious Codes by the presence of their Gene of Self-Replication, Computer Network Security, LNCS, Volume 2776, Springer, 2003.
    • (2003) LNCS , vol.2776
    • Skormin, V.1    Summerville, D.2    Moronski, J.3
  • 20
    • 58049117873 scopus 로고    scopus 로고
    • Stonesoft Inc, October 1, 2003
    • Stonesoft Inc., Winning the Battle against False Positives, October 1, 2003, http://www.stonesoft.com/files/products/StoneGate/ SGWP_WinningTheBattleAgainstFalsePositives_print.pdf.
    • Winning the Battle against False Positives
  • 22
    • 0242456143 scopus 로고    scopus 로고
    • NATE- Network Analysis of Anomolous Traffic Events, A Low Cost Approach
    • Sept 10-13
    • C. Taylor and J. Alves-Foss, NATE- Network Analysis of Anomolous Traffic Events, A Low Cost Approach, In Proceedings of the NSPW'01, Sept 10-13, 2001, pp. 89-96.
    • (2001) Proceedings of the NSPW'01 , pp. 89-96
    • Taylor, C.1    Alves-Foss, J.2
  • 23
    • 84958963167 scopus 로고    scopus 로고
    • Accurate Buffer Overflow Detection via Abstract Payload Execution
    • 5th Symp on Recent Advances in Intrusion Detection RAID, Springer Verlag, Switzerland, pp, Oct
    • T. Toth and C. Kruegel, Accurate Buffer Overflow Detection via Abstract Payload Execution, 5th Symp on Recent Advances in Intrusion Detection (RAID), LNCS, Springer Verlag, Switzerland, pp. 274-91, Oct 2002.
    • (2002) LNCS , pp. 274-291
    • Toth, T.1    Kruegel, C.2
  • 24
    • 58049129088 scopus 로고    scopus 로고
    • Viruslist.com, Kaspersky Security Bulletin 2006: Internet Attacks, http://www.viruslist.com/en/analysis?pubid=204791921.
    • Viruslist.com, Kaspersky Security Bulletin 2006: Internet Attacks, http://www.viruslist.com/en/analysis?pubid=204791921.
  • 25
    • 58049112254 scopus 로고    scopus 로고
    • K. Wang and S.J. Stolfo, Anomalous Payload-based Network Intrusion Detection, Columbia University Technical Report, Feb. 2nd, 2004, http://www1.cs.columbia.edu/ids/publications/Payl-AD.02.01.04-final.PDF.
    • K. Wang and S.J. Stolfo, Anomalous Payload-based Network Intrusion Detection, Columbia University Technical Report, Feb. 2nd, 2004, http://www1.cs.columbia.edu/ids/publications/Payl-AD.02.01.04-final.PDF.
  • 27
    • 58049125859 scopus 로고    scopus 로고
    • Online Scanner Top Twenty
    • Viruslist.com, Online Scanner Top Twenty..., http://www.viruslist. com-/en/analysis.
    • Viruslist.com
  • 28
    • 58049095355 scopus 로고    scopus 로고
    • A. Yee, Making false positives go away, Computerworld, 28/01/2004.
    • A. Yee, Making false positives go away, Computerworld, 28/01/2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.