메뉴 건너뛰기




Volumn 5352 LNCS, Issue , 2008, Pages 188-202

Incorporation of application layer protocol syntax into anomaly detection

Author keywords

Anomaly Detection; Protocol Analysis; Web Security

Indexed keywords

APPLICATIONS; CODES (SYMBOLS); INFORMATION SYSTEMS; INTERNET; INTERNET PROTOCOLS; SECURITY OF DATA; SYNTACTICS;

EID: 58449089032     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89862-7_17     Document Type: Conference Paper
Times cited : (25)

References (23)
  • 2
    • 58449100838 scopus 로고    scopus 로고
    • Cretu, G., Stavrou, A., Locasto, M., Stolfo, S., Keromytis, A.: Casting out demons: Sanitizing training data for anomaly sensors. In: ieeesp (to appear, 2008)
    • Cretu, G., Stavrou, A., Locasto, M., Stolfo, S., Keromytis, A.: Casting out demons: Sanitizing training data for anomaly sensors. In: ieeesp (to appear, 2008)
  • 4
    • 33750379862 scopus 로고    scopus 로고
    • Gao, D., Reiter, M., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNGS, 4219, pp. 19-40. Springer, Heidelberg (2006)
    • Gao, D., Reiter, M., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNGS, vol. 4219, pp. 19-40. Springer, Heidelberg (2006)
  • 5
    • 38149142569 scopus 로고    scopus 로고
    • Ingham, K.L., Inoue, H.: Comparing anomaly detection techniques for http. In: Kruegel, C, Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 42-62. Springer, Heidelberg (2007)
    • Ingham, K.L., Inoue, H.: Comparing anomaly detection techniques for http. In: Kruegel, C, Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 42-62. Springer, Heidelberg (2007)
  • 6
    • 33846369107 scopus 로고    scopus 로고
    • Learning dfa representations of http for protecting web applications
    • Ingham, K.L., Somayaji, A. Burge, J., Forrest. S.: Learning dfa representations of http for protecting web applications. Computer Networks 51(5), 1239-1255 (2007)
    • (2007) Computer Networks , vol.51 , Issue.5 , pp. 1239-1255
    • Ingham, K.L.1    Somayaji, A.2    Burge, J.3    Forrest, S.4
  • 9
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information Systems Security 3, 227-261 (2000)
    • (2000) ACM Transactions on Information Systems Security , vol.3 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 10
    • 0036358995 scopus 로고    scopus 로고
    • The spectrum kernel: A string kernel for SVM protein classification
    • Leslie, C, Eskin, E., Noble, W.: The spectrum kernel: A string kernel for SVM protein classification. In: Proc. Pacific Symp. Biocomputing, pp. 564-575 (2002)
    • (2002) Proc. Pacific Symp. Biocomputing , pp. 564-575
    • Leslie, C.1    Eskin, E.2    Noble, W.3
  • 11
    • 0141441130 scopus 로고    scopus 로고
    • PHAD: Packet header anomaly detection for identifying hostile network traffic
    • Technical Report CS-2001-2, Florida Institute of Technol- ogy
    • Mahoney, M., Chan, P.: PHAD: Packet header anomaly detection for identifying hostile network traffic. Technical Report CS-2001-2, Florida Institute of Technol- ogy (2001)
    • (2001)
    • Mahoney, M.1    Chan, P.2
  • 13
    • 0035272287 scopus 로고    scopus 로고
    • Müller, K.-R., Mika, S., R.atsch, G., Tsuda, K., Scholkopf, B.: An introduction to kernel-based learning algorithms. IEEE Neural Networks 12(2), 181-201 (2001)
    • Müller, K.-R., Mika, S., R.atsch, G., Tsuda, K., Scholkopf, B.: An introduction to kernel-based learning algorithms. IEEE Neural Networks 12(2), 181-201 (2001)
  • 15
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V.: Bro: a system for detecting network intruders in real-time. In: Proc. of USEN1X Security Symposium, pp. 31-51 (1998)
    • (1998) Proc. of USEN1X Security Symposium , pp. 31-51
    • Paxson, V.1
  • 16
    • 33746430492 scopus 로고    scopus 로고
    • Rieck, K., Laskov, P.: Detecting unknown network attacks using language models. In: Büchkes, R., Laskov, P. (eds.) D1MVA 2006. LNCS, 4064, pp. 74-90. Springer, Heidelberg (2006)
    • Rieck, K., Laskov, P.: Detecting unknown network attacks using language models. In: Büchkes, R., Laskov, P. (eds.) D1MVA 2006. LNCS, vol. 4064, pp. 74-90. Springer, Heidelberg (2006)
  • 17
    • 33846910249 scopus 로고    scopus 로고
    • Language models for detection of unknown attacks in network traffic
    • Rieck, K., Laskov, P.: Language models for detection of unknown attacks in network traffic. Journal in Computer Virology 2(4), 243-256 (2007)
    • (2007) Journal in Computer Virology , vol.2 , Issue.4 , pp. 243-256
    • Rieck, K.1    Laskov, P.2
  • 18
    • 38949156579 scopus 로고    scopus 로고
    • Linear-time computation of similarity measures for sequential data
    • Rieck, K., Laskov, P.: Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research 9, 23-48 (2008)
    • (2008) Journal of Machine Learning Research , vol.9 , pp. 23-48
    • Rieck, K.1    Laskov, P.2
  • 21
    • 0001986205 scopus 로고    scopus 로고
    • Data domain description by support vectors
    • ed, Proc. ESANN, Brussels, pp, D. Facto Press
    • Tax, D., Duin, R,.: Data domain description by support vectors. In: Verleysen, M. (ed.) Proc. ESANN, Brussels, pp. 251-256. D. Facto Press (1999)
    • (1999) Verleysen, M , pp. 251-256
    • Tax, D.1    Duin, R.2
  • 22
    • 33750335757 scopus 로고    scopus 로고
    • Wang, K., Parekh, J., Stolfo, S.: Anagram: A content anomaly detector resistant to mimicry attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, 4219, pp. 226-248. Springer, Heidelberg (2006)
    • Wang, K., Parekh, J., Stolfo, S.: Anagram: A content anomaly detector resistant to mimicry attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226-248. Springer, Heidelberg (2006)
  • 23
    • 35048885009 scopus 로고    scopus 로고
    • Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 203-222. Springer, Heidelberg (2004)
    • Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.