메뉴 건너뛰기




Volumn 5, Issue 4, 2010, Pages 220-235

Efficient decision tree for protocol analysis in intrusion detection

Author keywords

Decision tree; Inference system; Intrusion detection; Pattern matching; Protocol analysis

Indexed keywords

DECISION TREES; PATTERN MATCHING; SEMANTICS; TREES (MATHEMATICS);

EID: 78650634152     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2010.037661     Document Type: Article
Times cited : (33)

References (32)
  • 1
    • 10444238508 scopus 로고    scopus 로고
    • On the fly pattern matching for intrusion detection with snort
    • Abbes, T., Bouhoula, A. and Rusinowitch, M. (2004) 'On the fly pattern matching for intrusion detection with snort', Annals of Telecommunications, Vol. 59, Nos. 9-10, pp.941-967.
    • (2004) Annals of Telecommunications , vol.59 , Issue.9-10 , pp. 941-967
    • Abbes, T.1    Bouhoula, A.2    Rusinowitch, M.3
  • 2
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • Aho, A. and Corasick, M. (1975) 'Efficient string matching: an aid to bibliographic search', Communications of the ACM, Vol. 18, No. 6, pp.333-340.
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.1    Corasick, M.2
  • 3
    • 0004053867 scopus 로고    scopus 로고
    • 4th ed., pub-OR, 981 Chestnut Street, Newton, MA 02164, USA, Covers BIND 9
    • Albitz, P. and Liu, C. (2001) DNS and BIND, 4th ed., pub-OR, 981 Chestnut Street, Newton, MA 02164, USA, Covers BIND 9.
    • (2001) DNS and BIND
    • Albitz, P.1    Liu, C.2
  • 5
    • 0017547820 scopus 로고
    • A fast string searching algorithm
    • Boyer, R.S. and Moore, J.S. (1977) 'A fast string searching algorithm', Communications of the ACM, Vol. 20, No. 10, pp.762-772.
    • (1977) Communications of the ACM , vol.20 , Issue.10 , pp. 762-772
    • Boyer, R.S.1    Moore, J.S.2
  • 8
    • 0004189992 scopus 로고
    • Oxford University Press, New Yorksommer, ISBN 0-19-508609-0
    • Crochemore, M. and Rytter, W. (1994) Text Algorithms, Oxford University Press, New Yorksommer, ISBN 0-19-508609-0.
    • (1994) Text Algorithms
    • Crochemore, M.1    Rytter, W.2
  • 9
    • 85077692116 scopus 로고    scopus 로고
    • Dynamic application-layer protocol analysis for network intrusion detection
    • Vancouver, BC, Canada, USENIX Association, Berkeley, CA, USA
    • Dreger, H., Feldmann, A., Mai, M., Paxson, V. and Sommer, R. (2006) 'Dynamic application-layer protocol analysis for network intrusion detection', Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, USENIX Association, Berkeley, CA, USA, pp.257-272.
    • (2006) Proceedings of the 15th USENIX Security Symposium , pp. 257-272
    • Dreger, H.1    Feldmann, A.2    Mai, M.3    Paxson, V.4    Sommer, R.5
  • 12
    • 1542350966 scopus 로고    scopus 로고
    • Technical Report CS 20001-0670, Department of Computer Science and Engineering, University of California, San Diego
    • Fisk, M. and Varghese, G. (2001) Fast Content-Based Packet Handling for Intrusion Detection, Technical Report CS 20001-0670, Department of Computer Science and Engineering, University of California, San Diego.
    • (2001) Fast Content-Based Packet Handling for Intrusion Detection
    • Fisk, M.1    Varghese, G.2
  • 14
    • 78650657387 scopus 로고    scopus 로고
    • URL
    • Graham, R. (2002) Evolution of IDS, URL: http://www. robertgraham.com/ slides/0304-evolution-of-ids.ppt
    • (2002) Evolution of IDS
    • Graham, R.1
  • 15
    • 66249097376 scopus 로고    scopus 로고
    • Research of NIDS in IPV6 based on protocol analysis and pattern matching
    • IEEE Computer Society, Los Alamitos, CA, USA
    • Huang, S., Zhang, H. and Yao, G. (2009) 'Research of NIDS in IPV6 based on protocol analysis and pattern matching', International Workshop on Knowledge Discovery and Data Mining, IEEE Computer Society, Los Alamitos, CA, USA, Vol. 0, pp.542-545.
    • (2009) International Workshop on Knowledge Discovery and Data Mining , vol.0 , pp. 542-545
    • Huang, S.1    Zhang, H.2    Yao, G.3
  • 17
    • 78650640244 scopus 로고    scopus 로고
    • Internet Systems Consortium, Inc. URL
    • Internet Systems Consortium, Inc. (2004) URL: http://www.isc.org/index. pl?/sw/bind /bind-security.php
    • (2004)
  • 20
    • 78650643744 scopus 로고    scopus 로고
    • NFR Security Inc.
    • NFR Security Inc. (2002) NFR, Network Intrusion Detection, v3, URL: http://www.spectrum-systems.com/nfr-nid-datasheet.pdf
    • (2002) NFR, Network Intrusion Detection, v3
  • 28
    • 78650660219 scopus 로고
    • RFC 1831: RPC: Remote Procedure Call Protocol Specification Version 2
    • Srinivasan, R. (1995a) RFC 1831: RPC: Remote Procedure Call Protocol Specification Version 2, Status: PROPOSED STANDARD.
    • (1995) Status: PROPOSED STANDARD
    • Srinivasan, R.1
  • 29
    • 78650662907 scopus 로고
    • RFC 1832: XDR: External Data Representation Standard
    • Srinivasan, R. (1995b) RFC 1832: XDR: External Data Representation Standard, Status: DRAFT STANDARD.
    • (1995) Status: DRAFT STANDARD
    • Srinivasan, R.1
  • 30
    • 78650643510 scopus 로고
    • RFC 1833: Binding Protocols for ONC RPC Version 2
    • Srinivasan, R. (1995c) RFC 1833: Binding Protocols for ONC RPC Version 2, Status: PROPOSED STANDARD.
    • (1995) Status: PROPOSED STANDARD
    • Srinivasan, R.1
  • 31
    • 25144439604 scopus 로고    scopus 로고
    • 1st ed. Addison-Wesley, Longman Publishing Co., Inc., Boston, MA, USA
    • Tan, P., Steinbach, M. and Kumar, V. (2005) Introduction to Data Mining, 1st ed., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.
    • (2005) Introduction to Data Mining
    • Tan, P.1    Steinbach, M.2    Kumar, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.