1 |
US Department of Defense Cyber Strategy, US Department of Defense, pp. 2-8, 2015.
|
2 |
Linux IP Firewalling Chains. http://people.netfilter.org/rusty/ipchains (accessed Sept., 25, 2019).
|
3 |
Netfilter: firewalling, NAT, and packet mangling for Linux. http://www.netfilter.org (accessed Sept., 25, 2019).
|
4 |
K. Wang, "Anomalous Payload -Based Network Intrusion Detection," Recent Advances in Intrusion Detection. Springer Berlin. doi:10.1007/978-3-540-30143-1_11.
DOI
|
5 |
R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee, "McPAD : A Multiple Classification System for Accurate Payload-based Anomaly Detection," Computer Networks, Special Issue on Traffic Classification and Its Applications to Modern Networks, vol. 5, no. 6, pp. 864-881, 2009.
|
6 |
AV-TEST: Malware statistics. http://www.av-test.org/en/statistics/malware (accessed Sept., 25, 2019).
|
7 |
K.H. Lee and G.S. Ryu, "Research for improving vulnerability of unmanned aerial vehicles," Smart Media Journal, vol. 7, no. 3, pp. 64-71, 2018
DOI
|
8 |
W.J. Joe, H.J. Shin, and H.S. Kim, "A log visualization method for network security monitoring," Smart Media Journal, vol. 7, no. 4, pp. 70-78, 2018
|
9 |
S.I. Bae and E.G. Im, "Unpacking Technique for In-memory malware injection technique," Smart Media Journal, vol. 8, no. 1, pp. 19-26, 2019
|
10 |
Snort: Network intrusion detection and prevention system. http://www.snort.org (accessed Sept., 25, 2019).
|
11 |
The Bro Network Security Monitor. https://www.bro.org (accessed Sept., 25, 2019).
|
12 |
Suricata: Open IDS / IPS / NSM engine. https://suricata-ids.org (accessed Sept., 25, 2019).
|
13 |
G. Navarro, "A guided tour to approximate string matching," ACM Computing Surveys, vol. 33, no. 1, pp. 31-88, 2001
DOI
|
14 |
E.W. Myers, "A Four Russians Algorithm for Regular Expression Pattern Matching," Journal of ACM, vol. 39, no. 2, pp. 430-448, 1992
DOI
|
15 |
D. Belazzougui and M. Raffinot, "Approximate regular expression matching with multi-strings," Journal of Discrete Algorithms, vol. 18, pp. 14-21, 2013
DOI
|
16 |
H. Altwaijry and K. Shahbar, "Automatic SNORT Signatures Generation by using Honeypot," Journal of Computers , vol. 8, no. 12, pp. 3280-3286, 2013
|
17 |
B. Rice, "Automated Snort Signature Generation", Masters Theses, James Madison University, 2014
|
18 |
S. Ashfaq, M.U. Farooq, and A. Karim, "Efficient rule generation for cost-sensitive misuse detection using genetic algorithms," Proc. of CIS, pp. 282-285, 2006
|
19 |
H.A. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," USENIX Security Symposium, pp. 271-286, 2004
|
20 |
C. Schensted, "Longest increasing and decreasing subsequences," Canadian Journal of Mathematics, vol. 13, pp. 179-191, 1961
DOI
|
21 |
R.M. Karp and M.O. Rabin, "Efficient randomized pattern-matching algorithms," IBM Journal of Research and Development, vol.31, no. 2, pp. 249-260, 1987
DOI
|
22 |
Sniffles: Capture Generator for IDS and Regular Expression Evaluation. https://github.com/petabi/sniffles (accessed Sept., 25, 2019).
|
23 |
M. Shao, M.S. Kim, V.C. Valgenti, and J. Park, "Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems," IEICE Transactions on Information and Systems, vol. 99-D, no. 8, pp. 2090-2099, 2016
|
24 |
tcpdump and libpcap. http://www.tcpdump.org (accessed Sept., 25, 2019).
|