Packet inspection for application classification and intrusion detection

作者: Jisheng Wang

DOI:

关键词: Real-time computingEngineeringSpeech recognitionIntrusion detection systemDeep packet inspection

摘要:

参考文章(86)
S. Zander, T. Nguyen, G. Armitage, Automated traffic classification and application identification using machine learning local computer networks. pp. 250- 257 ,(2005) , 10.1109/LCN.2005.35
Dario Bonfiglio, Marco Mellia, Michela Meo, Dario Rossi, Paolo Tofanelli, Revealing skype traffic: when randomness plays with you acm special interest group on data communication. ,vol. 37, pp. 37- 48 ,(2007) , 10.1145/1282380.1282386
Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, B. Chavez, Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience ieee symposium on security and privacy. pp. 32- 47 ,(2006) , 10.1109/SP.2006.18
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli, Traffic classification through simple statistical fingerprinting acm special interest group on data communication. ,vol. 37, pp. 5- 16 ,(2007) , 10.1145/1198255.1198257
M.M. Williamson, Throttling viruses: restricting propagation to defeat malicious mobile code annual computer security applications conference. pp. 61- 68 ,(2002) , 10.1109/CSAC.2002.1176279
Lucas Chi, Kwong Hui, Color Set Size Problem with Application to String Matching combinatorial pattern matching. pp. 230- 243 ,(1992) , 10.1007/3-540-56024-6_19
Tzi-Cker Chiueh, Fu-Hau Hsu, RAD: a compile-time solution to buffer overflow attacks international conference on distributed computing systems. pp. 409- 417 ,(2001) , 10.1109/ICDSC.2001.918971
Anukool Lakhina, Mark Crovella, Christophe Diot, Mining anomalies using traffic feature distributions acm special interest group on data communication. ,vol. 35, pp. 217- 228 ,(2005) , 10.1145/1080091.1080118
James Newsome, David Brumley, Dawn Xiaodong Song, Jad Chamcham, Xeno Kovah, Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software network and distributed system security symposium. ,(2006)
Cullen Linn, Saumya Debray, Obfuscation of executable code to improve resistance to static disassembly computer and communications security. pp. 290- 299 ,(2003) , 10.1145/948109.948149