Mitigating network attacks using automatic signature generation

作者: Rephael Tzadikario

DOI:

关键词:

摘要: A computer-implemented method for mitigating attacks of malicious traffic in a computer network [figure 1 , unit 20 includes receiving set attack sequences, including first sequences suspected containing the traffic, analyzing so as to automatically extract regular expression that matches at least portion set, and comparing second order identify contain traffic.

参考文章(33)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Anujan Varma, Dimitrios Stiliadis, FRAME-BASED FAIR QUEUEING: A NEW TRAFFIC SCHEDULING ALGORITHM FOR PACKET-SWITCHED NETWORKS University of California at Santa Cruz. ,(1995)
Dan Touitou, Yehuda Afek, Rafi Zadikario, Barr Anat Bremler, Protecting against malicious traffic ,(2002)
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Stanley Yamane, Marco Lara, Freeland Abbott, Method and system for measuring queue length and delay ,(1998)
D.A. Eckhardt, P. Steenkiste, Effort-limited fair (ELF) scheduling for wireless networks international conference on computer communications. ,vol. 3, pp. 1097- 1106 ,(2000) , 10.1109/INFCOM.2000.832465
J.C.R. Bennett, Hui Zhang, WF/sup 2/Q: worst-case fair weighted fair queueing international conference on computer communications. ,vol. 1, pp. 120- 128 ,(1996) , 10.1109/INFCOM.1996.497885