메뉴 건너뛰기




Volumn , Issue , 2011, Pages 291-299

Automatic protocol signature generation framework for deep packet inspection

Author keywords

Automatic protocol signature generation; Deep packet inspection; Motif finding

Indexed keywords

BIOINFORMATICS; TOOLS;

EID: 84889022645     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4108/icst.valuetools.2011.245606     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 3
    • 84897375156 scopus 로고    scopus 로고
    • glam2 - a motif finding tool
    • glam2 - a motif finding tool. http://bioinformatics.org.au/glam2/.
  • 5
    • 84897410146 scopus 로고    scopus 로고
    • Lectures in bioinformatics
    • Lectures in bioinformatics. http://www.cs.otago.ac.nz/cosc348/lectures. html.
  • 9
    • 84897471342 scopus 로고    scopus 로고
    • tcpfiow
    • tcpfiow. http://sourCeforge.net/projeCts/tCpflow/.
  • 10
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H. ah Kim. Autograph: Toward automated, distributed worm signature detection. In In Proceedings of the 13th Usenix Security Symposium, pages 271-286, 2004.
    • (2004) Proceedings of the 13th Usenix Security Symposium , pp. 271-286
    • Ah Kim, H.1
  • 12
    • 29244451861 scopus 로고    scopus 로고
    • Acas: Automated construction of application signatures
    • New York, NY, USA
    • P. Haffner, S. Sen, O. Spatscheck, and D. Wang. Acas: automated construction of application signatures. In MineNet '05, New York, NY, USA, 2005.
    • (2005) MineNet '05
    • Haffner, P.1    Sen, S.2    Spatscheck, O.3    Wang, D.4
  • 13
    • 80455151509 scopus 로고    scopus 로고
    • Programming with constraints: An introduction by kim marriott and peter j. Stuckey
    • mit press, 1998
    • M. Hanus. Programming with constraints: An introduction by kim marriott and peter j. stuckey, mit press, 1998. J. Funct. Program., 11(2):253-262, 2001.
    • (2001) J. Funct. Program. , vol.11 , Issue.2 , pp. 253-262
    • Hanus, M.1
  • 15
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • March
    • S. B. Needleman and C. D. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 48(3):443-453, March 1970.
    • (1970) Journal of Molecular Biology , vol.48 , Issue.3 , pp. 443-453
    • Needleman, S.B.1    Wunsch, C.D.2
  • 16
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • Washington,DC, USA, IEEE Computer Society
    • J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 226-241, Washington,DC, USA, 2005. IEEE Computer Society.
    • (2005) Proceedings of the 2005 IEEE Symposium on Security and Privacy , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 17
    • 51849134180 scopus 로고    scopus 로고
    • Towards automated application signature generation for traffic identification
    • B. Park, Y. J. Won, M. Kim, and J. W. Hong. Towards automated application signature generation for traffic identification. In NOMS, pages 160-167, 2008.
    • (2008) NOMS , pp. 160-167
    • Park, B.1    Won, Y.J.2    Kim, M.3    Hong, J.W.4
  • 20
    • 0019887799 scopus 로고
    • Identification of common molecular subsequences
    • T. F. Smith and M. S. Waterman. Identification of common molecular subsequences. Journal of Molecular Biology, 147(1):195-197, 1981.
    • (1981) Journal of Molecular Biology , vol.147 , Issue.1 , pp. 195-197
    • Smith, T.F.1    Waterman, M.S.2
  • 21
    • 80054985820 scopus 로고    scopus 로고
    • On the validation of traffic classification algorithms
    • Cleveland, Ohio, USA, April
    • G. Szabó, D. Orincsay, I. Szabó, and S. Malomsoky. On the validation of traffic classification algorithms. In Proc. PAM, Cleveland, Ohio, USA, April 2008.
    • (2008) Proc. PAM
    • Szabó, G.1    Orincsay, D.2    Szabó, I.3    Malomsoky, S.4
  • 23
    • 71849087786 scopus 로고    scopus 로고
    • Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
    • Y. Tang, B. Xiao, and X. Lu. Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms. Computers & Security, 28(8):827-842, 2009.
    • (2009) Computers and Security , vol.28 , Issue.8 , pp. 827-842
    • Tang, Y.1    Xiao, B.2    Lu, X.3
  • 25
    • 0003422462 scopus 로고    scopus 로고
    • Springer-Verlag New York, Inc., New York, NY, USA
    • V. V. Vazirani. Approximation algorithms. Springer-Verlag New York, Inc., New York, NY, USA, 2001.
    • (2001) Approximation Algorithms.
    • Vazirani, V.V.1
  • 26
    • 73549107668 scopus 로고    scopus 로고
    • Autosig-automatically generating signatures for applications
    • IEEE Computer Society
    • M. Ye, K. Xu, J. Wu, and H. Po. Autosig-automatically generating signatures for applications. In CIT (2), pages 104-109. IEEE Computer Society, 2009.
    • (2009) CIT , vol.2 , pp. 104-109
    • Ye, M.1    Xu, K.2    Wu, J.3    Po, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.