메뉴 건너뛰기




Volumn , Issue , 2009, Pages 17-24

Intrusion detection using signatures extracted from execution profiles

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; NETWORK SECURITY;

EID: 70349916409     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWSESS.2009.5068454     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 1
    • 63849251457 scopus 로고    scopus 로고
    • Apache Tomcat. http://www.akarta.apache.org/tomcat
    • Apache Tomcat
  • 2
    • 70349932871 scopus 로고    scopus 로고
    • The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
    • The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
  • 3
    • 70349925750 scopus 로고    scopus 로고
    • Towards Practical Automatic Generation of Multipath Vulnerability Signatures
    • Technical Report, Carnegie Mellon University, April
    • D. Brumley, Z. Liang, J. Newsome, D. Song. "Towards Practical Automatic Generation of Multipath Vulnerability Signatures". Technical Report, Carnegie Mellon University, April 2007.
    • (2007)
    • Brumley, D.1    Liang, Z.2    Newsome, J.3    Song, D.4
  • 4
    • 33751056900 scopus 로고    scopus 로고
    • D. Brumley, J. Newsome, D. Song, H. Wang, S. Jha. Towards Automatic Generation of Vulnerability-Based Signatures. Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 2006, pp. 2-16.
    • D. Brumley, J. Newsome, D. Song, H. Wang, S. Jha. "Towards Automatic Generation of Vulnerability-Based Signatures". Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 2006, pp. 2-16.
  • 6
    • 33748704060 scopus 로고    scopus 로고
    • Clique-detection models in computational biochemistry and genomics
    • S. Butenko and W. E. Wilhelm, "Clique-detection models in computational biochemistry and genomics", European Journal of Operational Research, 173(1), pp. 1-17, 2006.
    • (2006) European Journal of Operational Research , vol.173 , Issue.1 , pp. 1-17
    • Butenko, S.1    Wilhelm, W.E.2
  • 8
    • 70349100099 scopus 로고    scopus 로고
    • H. Feng, O. Kolesnikov, P. Fogla, W. Lee, W. Gong. Anomaly Detection using Call Stack Information. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003, p. 62.
    • H. Feng, O. Kolesnikov, P. Fogla, W. Lee, W. Gong. "Anomaly Detection using Call Stack Information". Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003, p. 62.
  • 9
    • 0029716418 scopus 로고    scopus 로고
    • S. Forrest, S. Hofmeyr, A. Somayaji, T. longstaff. A Sense of Self for Unix Processes. Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, May 1996, pp. 120-128.
    • S. Forrest, S. Hofmeyr, A. Somayaji, T. longstaff. "A Sense of Self for Unix Processes". Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, May 1996, pp. 120-128.
  • 12
    • 0031167903 scopus 로고    scopus 로고
    • A genetic algorithm-based heuristic for solving the weighted maximum independent set and some equivalent problems
    • M. Hifi, "A genetic algorithm-based heuristic for solving the weighted maximum independent set and some equivalent problems". The Journal of the Operational Research Society, 48(6), pp. 612-622, 1997.
    • (1997) The Journal of the Operational Research Society , vol.48 , Issue.6 , pp. 612-622
    • Hifi, M.1
  • 14
    • 85084163246 scopus 로고    scopus 로고
    • th USENIX Security Symposium, San Diego, California, August 2004, pp. 271-286.
    • th USENIX Security Symposium, San Diego, California, August 2004, pp. 271-286.
  • 15
    • 0142157009 scopus 로고    scopus 로고
    • C. Kruegel, D. Mutz, F. Valeur, G. Vigna. On the Detection of Anomalous System Call Arguments. Proceedings of the 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 2003, pp. 326-343.
    • C. Kruegel, D. Mutz, F. Valeur, G. Vigna. "On the Detection of Anomalous System Call Arguments". Proceedings of the 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 2003, pp. 326-343.
  • 22
    • 53049096535 scopus 로고    scopus 로고
    • Application-based Anomaly Intrusion Detection with Dynamic Information Flow Analysis
    • W. Masri, A. Podgurski. "Application-based Anomaly Intrusion Detection with Dynamic Information Flow Analysis". Computers and Security (ELSEVIER), 27(5-6), pp. 176-187, 2008.
    • (2008) Computers and Security (ELSEVIER) , vol.27 , Issue.5-6 , pp. 176-187
    • Masri, W.1    Podgurski, A.2
  • 23
    • 34250772325 scopus 로고    scopus 로고
    • An Empirical Study of Test Case Filtering Techniques Based On Exercising Information Flows
    • July
    • W. Masri, A. Podgurski and D. Leon. "An Empirical Study of Test Case Filtering Techniques Based On Exercising Information Flows". IEEE Transactions on Software Engineering, 33(7), pp. 454, July 2007.
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.7 , pp. 454
    • Masri, W.1    Podgurski, A.2    Leon, D.3
  • 24
    • 32544433135 scopus 로고    scopus 로고
    • A hybrid heuristic for the maximum clique problem
    • A. Singh and A.K. Gupta, "A hybrid heuristic for the maximum clique problem", Journal of Heuristics, 12(1-2), pp. 5-22, 2006.
    • (2006) Journal of Heuristics , vol.12 , Issue.1-2 , pp. 5-22
    • Singh, A.1    Gupta, A.K.2
  • 25
    • 0034836394 scopus 로고    scopus 로고
    • D. Wagner, D. Dean. Intrusion Detection via Static Analysis. Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001, pp. 156-168.
    • D. Wagner, D. Dean. "Intrusion Detection via Static Analysis". Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001, pp. 156-168.
  • 26
    • 0038011184 scopus 로고    scopus 로고
    • D. Wagner, P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, November 2002, pp. 255-264.
    • D. Wagner, P. Soto. "Mimicry Attacks on Host-Based Intrusion Detection Systems". Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, November 2002, pp. 255-264.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.