메뉴 건너뛰기




Volumn 43, Issue , 2014, Pages 189-204

EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism

Author keywords

Blacklist generation; Enhanced filter mechanism; Exclusive signature matching; False alarm reduction; Intrusion detection; Network security; Packet filter

Indexed keywords

ALARM SYSTEMS; COMPUTER CRIME; ERRORS; INTRUSION DETECTION;

EID: 84901240193     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.02.006     Document Type: Article
Times cited : (98)

References (51)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • A.V. Aho, and M.J. Corasick Efficient string matching: an aid to bibliographic search Commun ACM 18 6 1975 333 340
    • (1975) Commun ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 2
    • 26444495635 scopus 로고    scopus 로고
    • IDS False alarm reduction using continuous and discontinuous patterns
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • A. Alharbt, and H. Imai IDS false alarm reduction using continuous and discontinuous patterns Proceedings of the 3rd Int'l Conf. on Applied Cryptography and Network Security 2005 192 205 (Pubitemid 41422117)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 192-205
    • Alharby, A.1    Imai, H.2
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • S. Axelsson The base-rate fallacy and the difficulty of intrusion detection ACM Trans Information Syst Secur 3 3 2000 186 205
    • (2000) ACM Trans Information Syst Secur , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 5
    • 0017547820 scopus 로고
    • A fast string searching algorithm
    • R.S. Boyer, and J.S. Moore A fast string searching algorithm Commun ACM 20 10 1977 762 772
    • (1977) Commun ACM , vol.20 , Issue.10 , pp. 762-772
    • Boyer, R.S.1    Moore, J.S.2
  • 8
    • 79961024286 scopus 로고    scopus 로고
    • A fast pattern matching algorithm with multi-byte search unit for high-speed network security
    • Y.-H. Choi, M.-Y. Jung, and S.-W. Seo A fast pattern matching algorithm with multi-byte search unit for high-speed network security Comput Commun 34 14 2011 1750 1763
    • (2011) Comput Commun , vol.34 , Issue.14 , pp. 1750-1763
    • Choi, Y.-H.1    Jung, M.-Y.2    Seo, S.-W.3
  • 12
    • 84901220271 scopus 로고    scopus 로고
    • DARPA intrusion detection evaluation data set
    • DARPA intrusion detection evaluation data set: http://www.ll.mit.edu/ mission/communications/ist/corpora/ideval/data/1999data.html, 1999.
    • (1999)
  • 16
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M. Handley, C. Kreibich, and V. Paxson Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics Proceedings of the 10th Usenix Security Symp 2001 115 131
    • (2001) Proceedings of the 10th Usenix Security Symp , pp. 115-131
    • Handley, M.1    Kreibich, C.2    Paxson, V.3
  • 17
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. Hofmeyr, S. Forrest, and A. Somayaji Intrusion detection using sequences of system calls J Comput Secur 6 3 1998 151 180
    • (1998) J Comput Secur , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 18
    • 84984028908 scopus 로고
    • Practical fast searching in strings
    • R. Horspool Practical fast searching in strings Softw Pract Exp 10 6 1980 501 506
    • (1980) Softw Pract Exp , vol.10 , Issue.6 , pp. 501-506
    • Horspool, R.1
  • 20
    • 80053570343 scopus 로고    scopus 로고
    • A memory-efficient bit-split parallel string matching using pattern dividing for intrusion detection systems
    • H. Kim, H.-S. Kim, and S. Kang A memory-efficient bit-split parallel string matching using pattern dividing for intrusion detection systems IEEE Transactions Parallel Distributed Syst 22 11 2011 1904 1911
    • (2011) IEEE Transactions Parallel Distributed Syst , vol.22 , Issue.11 , pp. 1904-1911
    • Kim, H.1    Kim, H.-S.2    Kang, S.3
  • 22
    • 23944484457 scopus 로고    scopus 로고
    • IDS false alarm filtering using KNN classifier
    • Information Security Applications - 5th International Workshop, WISA 2004
    • K.H. Law, and L.F. Kwok IDS false alarm filtering using KNN classifier Proceedings of the 5th Int'l Conf. on Information Security Applications 2005 114 121 (Pubitemid 41190806)
    • (2005) Lecture Notes in Computer Science , vol.3325 , pp. 114-121
    • Law, K.H.1    Kwok, L.F.2
  • 23
    • 84875860431 scopus 로고    scopus 로고
    • A memory-efficient and modular approach for large-scale string pattern matching
    • H. Le, and V.K. Prasanna A memory-efficient and modular approach for large-scale string pattern matching IEEE Trans Comput 62 5 2013 844 857
    • (2013) IEEE Trans Comput , vol.62 , Issue.5 , pp. 844-857
    • Le, H.1    Prasanna, V.K.2
  • 24
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee, and S.J. Stolfo A framework for constructing features and models for intrusion detection systems ACM Trans Information Syst Secur 3 4 2000 227 261
    • (2000) ACM Trans Information Syst Secur , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 25
    • 36549085110 scopus 로고    scopus 로고
    • An active learning based TCM-KNN algorithm for supervised network intrusion detection
    • DOI 10.1016/j.cose.2007.10.002, PII S0167404807001101
    • Y. Li, and L. Guo An active learning based TCM-KNN algorithm for supervised network intrusion detection Comput Secur 26 7-8 2007 459 467 (Pubitemid 350191973)
    • (2007) Computers and Security , vol.26 , Issue.7-8 , pp. 459-467
    • Li, Y.1    Guo, L.2
  • 27
    • 0036321445 scopus 로고    scopus 로고
    • Use of k-nearest neighbor classifier for intrusion detection
    • DOI 10.1016/S0167-4048(02)00514-X
    • Y. Liao, and V. Rao Vemuri Use of k-nearest neighbor classifier for intrusion detection Comput Secur 21 5 2002 439 448 (Pubitemid 34835644)
    • (2002) Computers and Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 29
    • 84875834638 scopus 로고    scopus 로고
    • A new filtration method and a hybrid strategy for approximate string matching
    • C.W. Lu, C.L. Lu, and R.C.T. Lee A new filtration method and a hybrid strategy for approximate string matching Theor Comput Sci 481 2013 9 17
    • (2013) Theor Comput Sci , vol.481 , pp. 9-17
    • Lu, C.W.1    Lu, C.L.2    Lee, R.C.T.3
  • 31
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
    • J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory ACM Trans Information Syst Secur 3 4 2000 262 294
    • (2000) ACM Trans Information Syst Secur , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 32
    • 84856688278 scopus 로고    scopus 로고
    • Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection
    • Y. Meng, and L.-F. Kwok Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection Proceedings of the 7th Int'l Conf. on Information Assurance and Security 2011 74 79
    • (2011) Proceedings of the 7th Int'l Conf. on Information Assurance and Security , pp. 74-79
    • Meng, Y.1    Kwok, L.-F.2
  • 34
    • 84893779151 scopus 로고    scopus 로고
    • Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection
    • 10.1016/j.jnca.2013.05.009
    • Y. Meng, and L.-F. Kwok Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection J Netw Comput Appl 2013 10.1016/j.jnca.2013.05.009
    • (2013) J Netw Comput Appl
    • Meng, Y.1    Kwok, L.-F.2
  • 36
    • 84867325287 scopus 로고    scopus 로고
    • Multi-stride string searching for high-speed content inspection
    • D. Pao, and X. Wang Multi-stride string searching for high-speed content inspection Comput J 55 10 2012 1216 1231
    • (2012) Comput J , vol.55 , Issue.10 , pp. 1216-1231
    • Pao, D.1    Wang, X.2
  • 37
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson Bro: a system for detecting network intruders in real-time Comput Networks 31 23-24 1999 2435 2463
    • (1999) Comput Networks , vol.31 , Issue.2324 , pp. 2435-2463
    • Paxson, V.1
  • 39
    • 0007526771 scopus 로고
    • On the worst-case behavior of string-searching algorithms
    • R.L. Rivest On the worst-case behavior of string-searching algorithms SIAM J Comput 6 4 1977 669 674
    • (1977) SIAM J Comput , vol.6 , Issue.4 , pp. 669-674
    • Rivest, R.L.1
  • 40
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • M. Roesch Snort: lightweight intrusion detection for networks Proceedings of Usenix LISA Conference 1999 229 238
    • (1999) Proceedings of Usenix LISA Conference , pp. 229-238
    • Roesch, M.1
  • 47
    • 84947547225 scopus 로고    scopus 로고
    • Experiences with Specification-Based Intrusion Detection
    • Recent Advances in Intrusion Detection
    • P. Uppuluri, and R. Sekar Experiences with specification-based intrusion detection Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID) 2001 172 189 (Pubitemid 33352007)
    • (2001) Lecture Notes in Computer Science , Issue.2212 , pp. 172-189
    • Uppuluri, P.1    Sekar, R.2
  • 50
    • 0012405865 scopus 로고
    • Technical Report TR-94-17 Department of Computer Science. University of Arizona
    • S. Wu, and U. Manber A fast algorithm for multi-pattern seaching Technical Report TR-94-17 May 1994 Department of Computer Science. University of Arizona
    • (1994) A Fast Algorithm for Multi-pattern Seaching
    • Wu, S.1    Manber, U.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.