Browse > Article

시그니처 기반 침입 탐지 시스템의 최적화  

Lee, In-Bok (한국항공대학교)
O, Seong-Il ((주)인프니스네트웍스)
Keywords
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 조호성, 오성일, 이인복, 박희진, 나중채. "Snort 기반 탐지 규칙의 유사성 분석 프로그램 개발 및 활용", 한국차세대컴퓨팅학회 논문지 Vol. 11, No. 1, pp. 32-43, 2015.
2 V. C. Valgenti et al. "REduce: Removing redundancy from regular expression mathching in network security", International Conference on Computer Communications and Networks 2015, to appear.
3 J. Mirkovic and P. Reiher. "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review. Vol. 34, No. 2, pp 39-53, 2004.   DOI
4 C. Tankard. "Advanced persistent threats and how to monitor and deter them", Network security. 2011(8), pp 16-19, 2011.   DOI
5 A. Young and M. Yung, "Cryptovirology: extortion-based security threats and countermeasures", IEEE Symposium on Security and Privacy. pp. 129-140, 1996
6 Snort http://www.snort.org
7 Bro IDS. http://www.bro.org
8 M. Jamshed et al. "Kargus: A Highly-scalable Software-based Intrusion Detection System", ACM Conference on Computer and Communications Security 2012, pp. 317-328, 2012.
9 Suricata: Open Source IDS/IPS/NSM engine. http://suricata-ids.org
10 P. Dlugosch et al. "An efficient and scalable semiconductor architecture for parallel automata processing", IEEE Transaction on Parallel and Distributed Systems, Vol. 25, No. 12, pp. 3088-3098, 2014.   DOI
11 D. Knuth et al. "Fast pattern matching in Strings", SIAM Journal on Computing Vol. 6, No. 2, pp. 323-350, 1977   DOI
12 A. Aho and M. J. Corasick. "Efficient string matching: an aid to bibliographic search", Communications of ACM, Vol. 18, No. 6, pp. 333-340, 1975.   DOI
13 L. Pitt and M. K. Warmuth. "The minimum consistent DFA problem cannot be approximated within any polynomial", Journal of ACM VoI. 40, No. 1, pp. 95-142, 1993 .   DOI
14 L. J. Stockmeyer and A. R. Meyer. "Word problems requiring exponential time:preliminary report", Symposium on the Theory of Computing 1973, pp. 1-9, 1973.
15 한지용, 이인복, 한정희. Signature-Based IDS의 PCRE 성능 개선 방안. 정보과학회 논문지: 시스템 및 이론 Vol. 40, No. 2, pp. 53-60, 2013
16 J. Mendivelso et al. Finding overlaps within regular expressions with variable-Iength gaps. ACM Research in Adaptive and Convergent Systems 2013, pp. 16-21, 2013
17 J. Lee et al. Measuring similarities among intrusion detection rules on the MapReduce environment. ACM Research in Adaptive and Convergent Systems 2014, pp. 58-60, 2014.