메뉴 건너뛰기




Volumn 56, Issue 2, 2014, Pages 238-251

Generating profile-based signatures for online intrusion and failure detection

Author keywords

Application based intrusion detection; Combinations of program elements; Genetic algorithm; Online failure detection; Profile based signatures; Vulnerability based signatures

Indexed keywords

FAULT LOCALIZATION; INTRUSION DETECTION SYSTEMS; ONLINE FAILURE DETECTIONS; PROFILE-BASED SIGNATURES; PROGRAM ELEMENTS; PROGRAM EXECUTION PROFILE; PROGRAM VULNERABILITY; VULNERABILITY-BASED SIGNATURES;

EID: 84889882586     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2013.09.004     Document Type: Article
Times cited : (12)

References (61)
  • 3
    • 33244493965 scopus 로고    scopus 로고
    • Mary Jean Harrold: Efficient and precise dynamic impact analysis using execute-after sequences
    • Taweesup Apiwattanapong, Alessandro Orso, Mary Jean Harrold: Efficient and precise dynamic impact analysis using execute-after sequences, ICSE, 2005, pp. 432-441.
    • (2005) ICSE , pp. 432-441
    • Apiwattanapong, T.1    Orso, A.2
  • 4
    • 84889889213 scopus 로고    scopus 로고
    • Appendices: http://webfea. fea.aub.edu. lb/fea/wm13/Appendix-E.zip
    • Appendices: < http://webfea.fea.aub.edu.lb/fea/wm13/Appendix-A-D.pdf > < http://webfea.fea.aub.edu.lb/fea/wm13/Appendix-E.zip >.
  • 5
    • 33745488052 scopus 로고    scopus 로고
    • Combining visualization and statistical analysis to improve operator confidence and efficiency for failure detection and localization
    • June 2005
    • P. Bodik, G. Friedman, L. Biewald, Combining visualization and statistical analysis to improve operator confidence and efficiency for failure detection and localization, in: Proceedings of Second Int'l Conf. Autonomic Computing (ICAC '05), June 2005, pp. 89-100.
    • Proceedings of Second Int'l Conf. Autonomic Computing (ICAC '05) , pp. 89-100
    • Bodik, P.1    Friedman, G.2    Biewald, L.3
  • 6
    • 33751056900 scopus 로고    scopus 로고
    • Towards automatic generation of vulnerability-based signatures
    • DOI 10.1109/SP.2006.41, 1623997, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • D. Brumley, J. Newsome, D. Song, H. Wang, S. Jha, Towards automatic generation of vulnerability-based signatures, in: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 2006, pp. 2-16. (Pubitemid 44753708)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 2-16
    • Brumley, D.1    Newsome, J.2    Song, D.3    Wang, H.4    Jha, S.5
  • 11
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning A lattice model of secure information flow Communications of the ACM 19 5 May 1976 236 242
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 12
    • 26044480846 scopus 로고    scopus 로고
    • Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact
    • DOI 10.1007/s10664-005-3861-2
    • Hyunsook Do, Sebastian Elbaum, and Gregg Rothermel Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact Empirical Software Engineering 10 4 2005 405 435 (Pubitemid 41408554)
    • (2005) Empirical Software Engineering , vol.10 , Issue.4 , pp. 405-435
    • Do, H.1    Elbaum, S.2    Rothermel, G.3
  • 14
    • 0035250541 scopus 로고    scopus 로고
    • Dynamically discovering likely program invariants to support program evolution
    • DOI 10.1109/32.908957
    • M.D. Ernst, J. Cockrell, W.G. Griswold, and D. Notkin Dynamically discovering likely program invariants to sup-port program evolution IEEE Transactions on Software Engineering 27 2 2001 99 123 (Pubitemid 32254259)
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.2 , pp. 99-123
    • Ernst, M.D.1    Cockrell, J.2    Griswold, W.G.3    Notkin, D.4
  • 22
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • CA
    • H. Kim, B. Karp, Autograph: toward automated, distributed worm signature detection, in: Proceedings of the 13th USENIX Security Symposium, CA, 2004, pp. 271-286.
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 271-286
    • Kim, H.1    Karp, B.2
  • 25
  • 27
    • 34047189734 scopus 로고    scopus 로고
    • Search algorithms for regression test case prioritization
    • DOI 10.1109/TSE.2007.38
    • Z. Li, M. Harman, and R.M. Hierons Search algorithms for regression test case prioritization IEEE Transactions on Software Engineering 33 4 2007 225 237 (Pubitemid 46523213)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.4 , pp. 225-237
    • Li, Z.1    Harman, M.2    Hierons, R.M.3
  • 33
  • 34
    • 77952777780 scopus 로고    scopus 로고
    • Fault localization based on information flow coverage
    • W. Masri Fault localization based on information flow coverage Software Testing, Verification and Reliability. 20 2 2010 121 147
    • (2010) Software Testing, Verification and Reliability. , vol.20 , Issue.2 , pp. 121-147
    • Masri, W.1
  • 35
    • 55049108560 scopus 로고    scopus 로고
    • Exploiting the empirical characteristics of program dependences for improved forward computation of dynamic slice
    • W. Masri Exploiting the empirical characteristics of program dependences for improved forward computation of dynamic slice Empirical Software Engineering (ESE) 13 2008 369 399
    • (2008) Empirical Software Engineering (ESE) , vol.13 , pp. 369-399
    • Masri, W.1
  • 38
    • 84862330016 scopus 로고    scopus 로고
    • Enhancing Fault Localization via Multivariate Visualization
    • Montreal, Canada, April 2012
    • W. Masri, R. Abou Assi, F. Zaraket, N. Fatairi, Enhancing Fault Localization via Multivariate Visualization, Regression/ICST 2012, Montreal, Canada, April 2012.
    • Regression/ICST 2012
    • Masri, W.1    Abou Assi, R.2    Zaraket, F.3    Fatairi, N.4
  • 39
    • 84858020973 scopus 로고    scopus 로고
    • Test case filtering and prioritization based on coverage of combinations of program elements
    • Chicago, IL
    • W. Masri, M. El-Ghali, Test case filtering and prioritization based on coverage of combinations of program elements, in: Seventh International Workshop on Dynamic Analysis, WODA, Chicago, IL, 2009.
    • (2009) Seventh International Workshop on Dynamic Analysis, WODA
    • Masri, W.1    El-Ghali, M.2
  • 40
    • 79956213401 scopus 로고    scopus 로고
    • An algorithm for capturing variables dependences in test suites
    • W. Masri, and H. Halabi An algorithm for capturing variables dependences in test suites Journal of Systems and Software (JSS) 84 7 2011 1171 1190
    • (2011) Journal of Systems and Software (JSS) , vol.84 , Issue.7 , pp. 1171-1190
    • Masri, W.1    Halabi, H.2
  • 41
    • 53049096535 scopus 로고    scopus 로고
    • Application-based anomaly intrusion detection with dynamic information flow analysis
    • W. Masri, and A. Podgurski Application-based anomaly intrusion detection with dynamic information flow analysis Computers & Security 27 2008 176 187
    • (2008) Computers & Security , vol.27 , pp. 176-187
    • Masri, W.1    Podgurski, A.2
  • 42
    • 56349150784 scopus 로고    scopus 로고
    • Algorithms and tool support for dynamic information flow analysis
    • FEBRUARY
    • W. Masri, and A. Podgurski Algorithms and tool support for dynamic information flow analysis Information and Software Technology 51 February 2009 385 404
    • (2009) Information and Software Technology , vol.51 , pp. 385-404
    • Masri, W.1    Podgurski, A.2
  • 45
    • 34250772325 scopus 로고    scopus 로고
    • An empirical study of test case filtering techniques based on exercising information flows
    • W. Masri, A. Podgurski, and D. Leon An empirical study of test case filtering techniques based on exercising information flows IEEE Transactions on Software Engineering 33 7 2007 454
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.7 , pp. 454
    • Masri, W.1    Podgurski, A.2    Leon, D.3
  • 50
    • 84858033935 scopus 로고    scopus 로고
    • Using AOP for detailed runtime monitoring instrumentation
    • Amjad Nusayr, and Jonathan Cook Using AOP for detailed runtime monitoring instrumentation WODA 2009 8 14
    • (2009) WODA , pp. 8-14
    • Nusayr, A.1    Cook, J.2
  • 51
    • 80051932555 scopus 로고    scopus 로고
    • Are automated debugging techniques actually helping programmers?
    • C. Parnin, A. Orso, Are automated debugging techniques actually helping programmers? ISSTA 2011, pp. 199-209.
    • (2011) ISSTA , pp. 199-209
    • Parnin, C.1    Orso, A.2
  • 56
    • 32544433135 scopus 로고    scopus 로고
    • A hybrid heuristic for the maximum clique problem
    • DOI 10.1007/s10732-006-3750-x
    • A. Singh, and A.K. Gupta A hybrid heuristic for the maximum clique problem Journal of Heuristics 12 1-2 2006 5 22 (Pubitemid 43234613)
    • (2006) Journal of Heuristics , vol.12 , Issue.1-2 , pp. 5-22
    • Singh, A.1    Gupta, A.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.