메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Network-wide deployment of intrusion detection and prevention systems

Author keywords

intrusion detection; network management

Indexed keywords

ALTERNATIVE DESIGNS; HARDWARE CONSTRAINTS; INTRUSION DETECTION AND PREVENTION SYSTEMS; INTRUSION PREVENTION SYSTEMS; LINEAR PROGRAMMING FORMULATION; NETWORK INTRUSION DETECTION; NP-HARD; OPTIMIZATION PROBLEMS; RANDOMIZED ROUNDING; SPECIALIZED HARDWARE; UNWANTED TRAFFIC;

EID: 79951700744     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1921168.1921192     Document Type: Conference Paper
Times cited : (21)

References (42)
  • 4
    • 79951689998 scopus 로고    scopus 로고
    • AT&T Enterprise Threat Management. http://www.business.att.com/ enterprise/Family/business-continuity-enterprise/threat-management-enterprise/.
  • 10
    • 27544502282 scopus 로고    scopus 로고
    • Optimization of network firewalls policies using directed acyclic graphs
    • E. W. Fulp. Optimization of network firewalls policies using directed acyclic graphs. In Proc. Internet Management Conference, 2005.
    • Proc. Internet Management Conference, 2005
    • Fulp, E.W.1
  • 16
    • 79951710023 scopus 로고    scopus 로고
    • Predicting the Resource Consumption of Network Intrusion Detection Systems
    • H. Dreger, A. Feldmann, V. Paxson and R. Sommer. Predicting the Resource Consumption of Network Intrusion Detection Systems. In Proc. RAID, 2008.
    • Proc. RAID, 2008
    • Dreger, H.1    Feldmann, A.2    Paxson, V.3    Sommer, R.4
  • 17
    • 67650317025 scopus 로고    scopus 로고
    • Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention
    • J. Gonzalez, V. Paxson, and N. Weaver. Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. In Proc. ACM CCS, 2007.
    • Proc. ACM CCS, 2007
    • Gonzalez, J.1    Paxson, V.2    Weaver, N.3
  • 18
    • 24644463787 scopus 로고    scopus 로고
    • Efficient Algorithms for Online Decision Problems
    • Oct.
    • A. Kalai and S. Vempala. Efficient Algorithms for Online Decision Problems. Journal of Computer System Sciences, 71(3), Oct. 2005.
    • (2005) Journal of Computer System Sciences , vol.71 , Issue.3
    • Kalai, A.1    Vempala, S.2
  • 21
    • 70249096351 scopus 로고    scopus 로고
    • Correlation-Based Load Balancing for Intrusion Detection and Prevention Systems
    • A. Le, E. Al-Shaer, and R. Batouba. Correlation-Based Load Balancing for Intrusion Detection and Prevention Systems. In Proc. SECURECOMM, 2008.
    • Proc. SECURECOMM, 2008
    • Le, A.1    Al-Shaer, E.2    Batouba, R.3
  • 24
    • 25644441776 scopus 로고    scopus 로고
    • Configuring Networks with Content Filtering Nodes with Applications to Network Security
    • M. Kodialam, T. V. Lakshman, and Sudipta Sengupta. Configuring Networks with Content Filtering Nodes with Applications to Network Security. In Proc. INFOCOM, 2005.
    • Proc. INFOCOM, 2005
    • Kodialam, M.1    Lakshman, T.V.2    Sengupta, S.3
  • 28
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 29
    • 51249173817 scopus 로고
    • Randomized rounding: A technique for provably good algorithms and algorithmic proofs
    • Dec.
    • P. Raghavan and C. D. Thompson. Randomized rounding: A technique for provably good algorithms and algorithmic proofs. Combinatorica, 7(4), Dec. 1987.
    • (1987) Combinatorica , vol.7 , Issue.4
    • Raghavan, P.1    Thompson, C.D.2
  • 30
    • 49749137793 scopus 로고    scopus 로고
    • Performance of estimated traffic matrices in traffic engineering
    • M. Roughan, M. Thorup, and Y. Zhang. Performance of estimated traffic matrices in traffic engineering. In SIGMETRICS, 2003.
    • (2003) SIGMETRICS
    • Roughan, M.1    Thorup, M.2    Zhang, Y.3
  • 33
    • 70449118958 scopus 로고    scopus 로고
    • Scalable Coordination Techniques for Distributed Network Monitoring
    • M. R. Sharma and J. W. Byers. Scalable Coordination Techniques for Distributed Network Monitoring. In Proc. PAM, 2005.
    • Proc. PAM, 2005
    • Sharma, M.R.1    Byers, J.W.2
  • 34
    • 33846281935 scopus 로고    scopus 로고
    • Exploiting Independent State for Network Intrusion Detection
    • R. Sommer and V. Paxson. Exploiting Independent State for Network Intrusion Detection. In Proc. ACSAC, 2005.
    • Proc. ACSAC, 2005
    • Sommer, R.1    Paxson, V.2
  • 35
    • 67650434654 scopus 로고    scopus 로고
    • An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention
    • R. Sommer, V. Paxson, and N. Weaver. An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience, Wiley, 21(10):1255-1279, 2009.
    • (2009) Concurrency and Computation: Practice and Experience, Wiley , vol.21 , Issue.10 , pp. 1255-1279
    • Sommer, R.1    Paxson, V.2    Weaver, N.3
  • 40
    • 67650360753 scopus 로고    scopus 로고
    • SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification
    • F. Yu, T. V. Lakshman, M. A. Motoyama, and R. H. Katz. SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification. In Proc. ANCS, 2005.
    • Proc. ANCS, 2005
    • Yu, F.1    Lakshman, T.V.2    Motoyama, M.A.3    Katz, R.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.