메뉴 건너뛰기




Volumn 4, Issue 1, 2001, Pages 1-36

Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks

Author keywords

Design; Event correlation; Knowledge Based IDS; Link State routing protocol security; OSPF attacks; Real Time misuse intrusion detection; Real Time network protocol analysis; Security; Theory; Timed finite state machine

Indexed keywords


EID: 85017067350     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/383775.383776     Document Type: Article
Times cited : (29)

References (36)
  • 1
    • 0010006506 scopus 로고    scopus 로고
    • http://www.cis.upenn.edu/alur/onlinepub.html
    • Alur, R. 1998. Timed automata. http://www.cis.upenn.edu/alur/onlinepub.html.
    • (1998) Timed automata
    • Alur, R.1
  • 2
    • 0028413052 scopus 로고
    • A theory of timed automata
    • Apr. 25
    • Alur, R. and Dill, D. L. 1994. A theory of timed automata. Theor. Comput. Sci. 126, 2 (Apr. 25), 183-235.
    • (1994) Theor. Comput. Sci. , vol.126 , Issue.2 , pp. 183-235
    • Alur, R.1    Dill, D.L.2
  • 3
    • 0003964874 scopus 로고
    • Next generation intrusion detection expert system (NIDES): A summary
    • SRI International, Menlo Park, CA. http://www2.csl.sri.com/nides/index5.html
    • Anderson, D., Frivold, T., and Valde, A. 1995. Next generation intrusion detection expert system (NIDES): A summary. Tech. Rep. Computer Science Laboratory, SRI International, Menlo Park, CA. http://www2.csl.sri.com/nides/index5.html.
    • (1995) Tech. Rep. Computer Science Laboratory
    • Anderson, D.1    Frivold, T.2    Valde, A.3
  • 4
    • 0031703272 scopus 로고    scopus 로고
    • Detecting disruptive routers: A distributed network monitoring approach
    • (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA. http://seclab.cs.ucdavis.edu/cheung.
    • Bradley, K. A., Cheung, S., Puketza, N., Mukherjee, B., and Olsson, O. 1998. Detecting disruptive routers: A distributed network monitoring approach. In Proceedings of the 1998 IEEE Symposium on Computer Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA. http://seclab.cs.ucdavis.edu/cheung.
    • (1998) Proceedings of the 1998 IEEE Symposium on Computer Security and Privacy
    • Bradley, K.A.1    Cheung, S.2    Puketza, N.3    Mukherjee, B.4    Olsson, O.5
  • 6
    • 85024268796 scopus 로고    scopus 로고
    • Real-time protocol analysis for link-state routing
    • Computer Science Department, NC State, Raleigh, NC
    • Chang, H., Jou, Y., and Wu, S. 1998. Real-time protocol analysis for link-state routing. Tech. Rep. CDRL A007. Computer Science Department, NC State, Raleigh, NC.
    • (1998) Tech. Rep. CDRL A007
    • Chang, H.1    Jou, Y.2    Wu, S.3
  • 7
    • 0012978694 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • IBM Zurich Laboratory, Zurich, Switzerland. http://domino.watson.ibm.com/library/cyberdig.nsf/
    • Debar, H., Dacier, M., and Wespi, A. 1998. Towards a taxonomy of intrusion-detection systems. Tech. Rep. IBM Zurich Laboratory, Zurich, Switzerland. http://domino.watson.ibm.com/library/cyberdig.nsf/.
    • (1998) Tech. Rep.
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 9
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis, and implications
    • (Oakland, CA, May). IEEE Press, Piscataway, NJ.
    • D'haeseleer, P., Forrest, S., and Helman, P. 1996. An immunological approach to change detection: Algorithms, analysis, and implications. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ.
    • (1996) Proceedings of the IEEE Symposium on Security and Privacy
    • D'haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 10
    • 84976834622 scopus 로고
    • Self-stabilizing systems in spite of distributed control
    • Dijkstra, E. W. 1974. Self-stabilizing systems in spite of distributed control. Commun. ACM 17, 11, 643-644.
    • (1974) Commun. ACM , vol.17 , Issue.11 , pp. 643-644
    • Dijkstra, E.W.1
  • 11
    • 1842585733 scopus 로고
    • Artificial intelligence and intrusion detection: Current and future directions
    • (oct.). http://seclab.cs.ucdavis.edu/papers.html.
    • Frank, J. 1994. Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Conference on Computer Security (oct.). http://seclab.cs.ucdavis.edu/papers.html.
    • (1994) Proceedings of the 17th National Conference on Computer Security
    • Frank, J.1
  • 13
    • 0027576069 scopus 로고
    • Protocol verification made simple: a tutorial
    • (Apr.)
    • Gouda, M. G. 1993. Protocol verification made simple: a tutorial. Comput. Netw. ISDN Syst. 25, 9 (Apr.), 969-980.
    • (1993) Comput. Netw. ISDN Syst. , vol.25 , Issue.9 , pp. 969-980
    • Gouda, M.G.1
  • 15
  • 17
    • 0004154392 scopus 로고
    • Prentice-Hall, Inc., Upper Saddle River, NJ.
    • Huitema, C. 1995. Routing in the Internet. Prentice-Hall, Inc., Upper Saddle River, NJ.
    • (1995) Routing in the Internet.
    • Huitema, C.1
  • 18
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • (Mar.)
    • Ilgun, K., Kemmerer, R. A., and Porras, P. A. 1995. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21, 3 (Mar.), 181-199.
    • (1995) IEEE Trans. Softw. Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 20
    • 85024249477 scopus 로고    scopus 로고
    • Architecture design for a scalable intrusion detection for the emerging network infrastructure
    • Computer Science Department, NC State, Raleigh, NC. http://www.mcnc.org/HTML/ITD/ANR/JiNao.html.
    • Jou, Y., Gong, F., Sargor, C., Wu, S., and Cleaveland, W. 1997. Architecture design for a scalable intrusion detection for the emerging network infrastructure. Tech. Rep. Computer Science Department, NC State, Raleigh, NC. http://www.mcnc.org/HTML/ITD/ANR/JiNao.html.
    • (1997) Tech. Rep.
    • Jou, Y.1    Gong, F.2    Sargor, C.3    Wu, S.4    Cleaveland, W.5
  • 23
    • 0001383866 scopus 로고
    • An introduction to input/output automata
    • Lynch, N. A. and Tuttle, M. R. 1989. An introduction to input/output automata. CWI Q. 2, 3, 219-246.
    • (1989) CWI Q. , vol.2 , Issue.3 , pp. 219-246
    • Lynch, N.A.1    Tuttle, M.R.2
  • 24
    • 0008721904 scopus 로고    scopus 로고
    • ftp://ftp.isi.edu/in-notes/rfc2328.txt.
    • Moy, J. 1998a. RFC 2328: OSPF version 2. ftp://ftp.isi.edu/in-notes/rfc2328.txt.
    • (1998) RFC 2328: OSPF version 2.
    • Moy, J.1
  • 27
    • 0003529235 scopus 로고
    • Automatic alarm correlation for fault identification
    • (INFOCOM'95, Boston, MA, Apr.). IEEE Press, Piscataway, NJ.
    • Rouvellou, I. and Hart, G. W. 1995. Automatic alarm correlation for fault identification. In Proceedings of the Conference on INFOCOM (INFOCOM'95, Boston, MA, Apr.). IEEE Press, Piscataway, NJ.
    • (1995) Proceedings of the Conference on INFOCOM
    • Rouvellou, I.1    Hart, G.W.2
  • 28
    • 84880897051 scopus 로고
    • A simple assertional proof system for real-time systems
    • (Dec.). IEEE Computer Society Press, Los Alamitos, CA.
    • Shankar, A. 1992. A simple assertional proof system for real-time systems. In Proceedings of the 13th IEEE Symposium on Real-Time Systems (Dec.). IEEE Computer Society Press, Los Alamitos, CA.
    • (1992) Proceedings of the 13th IEEE Symposium on Real-Time Systems
    • Shankar, A.1
  • 29
    • 0028342073 scopus 로고
    • Reasoning assertionally about real-time systems
    • (Jan.).
    • Shankar, A. 1994. Reasoning assertionally about real-time systems. Proc. IEEE 82, 1 (Jan.).
    • (1994) Proc. IEEE , vol.82 , Issue.1
    • Shankar, A.1
  • 32
    • 0031382705 scopus 로고    scopus 로고
    • An experimental study of insider attacks for the OSPF routing protocol
    • (ICNP'97, Atlanta, GA, Oct.). IEEE Computer Society Press, Los Alamitos, CA.
    • Vetter, B., Wang, F., and Wu, S. 1997. An experimental study of insider attacks for the OSPF routing protocol. In Proceedings of the IEEE International Conference on Network Protocols (ICNP'97, Atlanta, GA, Oct.). IEEE Computer Society Press, Los Alamitos, CA.
    • (1997) Proceedings of the IEEE International Conference on Network Protocols
    • Vetter, B.1    Wang, F.2    Wu, S.3
  • 33
    • 85024252578 scopus 로고    scopus 로고
    • Design and implementation of a new intrusion detection approach: Property-oriented detection
    • Research Triangle Park, NC. http://worf.mcnc.org/fwang2.
    • Wang, F., Gong, F., and Wu, F. 2000. Design and implementation of a new intrusion detection approach: Property-oriented detection. Tech. Rep. MCNC, Research Triangle Park, NC. http://worf.mcnc.org/fwang2.
    • (2000) Tech. Rep. MCNC
    • Wang, F.1    Gong, F.2    Wu, F.3
  • 34
    • 0013294535 scopus 로고    scopus 로고
    • Secure routing protocols: Theory and practice
    • Computer Science Department, NC State, Raleigh, NC. http://shang.csc.ncsu.edu/pubs.html/.
    • Wang, F., Vetter, B., and Wu, S. 1998. Secure routing protocols: Theory and practice. Tech. Rep. Computer Science Department, NC State, Raleigh, NC. http://shang.csc.ncsu.edu/pubs.html/.
    • (1998) Tech. Rep.
    • Wang, F.1    Vetter, B.2    Wu, S.3
  • 35
    • 0003511389 scopus 로고    scopus 로고
    • Kluwer Academic Publishers, Hingham, MA.
    • Wang, J. 1998. Timed Petri Net. Kluwer Academic Publishers, Hingham, MA.
    • (1998) Timed Petri Net.
    • Wang, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.