Automatic generation and analysis of NIDS attacks

作者: S. Rubin , S. Jha , B.P. Miller

DOI: 10.1109/CSAC.2004.9

关键词:

摘要: … NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the attack payload to a NIDS … for NIDS testing and …

参考文章(29)
Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion, Undermining an anomaly-based intrusion detection system using common exploits recent advances in intrusion detection. pp. 54- 73 ,(2002) , 10.1007/3-540-36084-0_4
Klaus Kursawe, Klaus Julisch, Yves Deswarte, Andreas Wespi, Brian Randell, Dominique Alessandri, Christian Cachin, James Riordan, Marc Dacier, David Powell, Raffael Marty, M. Dacier, Design of an Intrusion-Tolerant Intrusion Detection System ,(2002)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Suzanne Wagner Dietrich, None, EXTENSION TABLES: MEMO RELATIONS IN LOGIC PROGRAMMING. SLP. pp. 264- 272 ,(1987)
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Vern Paxson, Christian Kreibich, Mark Handley, Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics usenix security symposium. pp. 9- 9 ,(2001)