References
- Y. Wang, Y. Xiang, W. L. Zhou, and S. Z. Yu, "Generating regular expression signatures for network traffic classification in trusted network management," J. Netw. Comput. Appl., vol. 35, pp. 992-1000, May 2012. https://doi.org/10.1016/j.jnca.2011.03.017
- B. Park, Y. Won, J. Chung, M. S. Kim, and J. W. K. Hong, "Fine-grained traffic classification based on functional separation," Int. J. Netw. Management, vol. 23, pp. 350- 381, Sept. 2013. https://doi.org/10.1002/nem.1837
- snort. Available: https://www.snort.org/
- H.-A. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," in USENIX Security Symp., vol. 286, 2004.
- J. Newsome, B. Karp, and D. Song, "Polygraph: Automatically generating signatures for polymorphic worms," IEEE Symp. Security and Privacy, pp. 226-241, 2005.
- B.-C. Park, Y. J. Won, M.-S. Kim, and J. W. Hong, "Towards automated application signature generation for traffic identification," IEEE Network Operations and Management Symp. (NOMS 2008), pp. 160-167, 2008.
- M. Ye, K. Xu, J. Wu, and H. Po, "Autosigautomatically generating signatures for applications," IEEE Int. Conf. Computer and Inf. Technol.(CIT'09), pp. 104-109, 2009.
- X. Feng, X. Huang, X. Tian, and Y. Ma, "Automatic traffic signature extraction based on smith-waterman algorithm for traffic classification," IEEE Int. Conf. Broadband Netw. Multimedia Technol. (IC-BNMT), pp. 154-158, 2010.
- C. Mu, X.-h. Huang, X. Tian, Y. Ma, and J.-l. Qi, "Automatic traffic signature extraction based on fixed bit offset algorithm for traffic classification," The J. China Universities of Posts and Telecommun., vol. 18, pp. 79-85, 2011. https://doi.org/10.1016/S1005-8885(10)60156-2
- R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in Proc. 20th Int. Conf. VLDB, pp. 487-499, 1994.
- R. Agrawal and R. Srikant, "Mining sequential patterns," in Proc. Eleventh Int. Conf. Data Eng., pp. 3-14, 1995.
- C. S. Park, J. S. Park, and M. S. Kim, "Automatic payload signature generation system," J. KICS, vol. 38B, no. 08, pp. 615-622, Aug. 2013.
- S. H. Yoon, J. S. Park, H. M. An, and M. S. Kim, "Traffic behavior signature extraction using sequence pattern algorithm," in Proc. KICS Int. Conf. Commun. (KICS ICC 2014), pp. 996-997, Jeju Island, Korea, Jun. 2014.
- https://www.wireshark.org
- https://www.tcpdump.org
- R. Srikant, Q. Vu, and R. Agrawal, "Mining association rules with item constraints," KDD, vol. 97, pp. 67-73, 1997.
- J. H. Park, J. S. Park, and M. S. Kim, "Processing speed improvement of HTTP traffic classification based on hierarchical structure of signature" J. KICS, vol. 39B, no. 04, pp. 191-199, Apr. 2014.
Cited by
- 고속 패킷 분류를 위한 2차원 비트맵 트라이 vol.40, pp.9, 2015, https://doi.org/10.7840/kics.2015.40.9.1754
- 네트워크 침입 탐지 시스템에서 다중 엔트리 동시 비교기를 이용한 고속패턴 매칭기의 설계 및 구현 vol.40, pp.11, 2015, https://doi.org/10.7840/kics.2015.40.11.2169
- K-평균 클러스터링을 이용한 네트워크 유해트래픽 탐지 vol.41, pp.2, 2016, https://doi.org/10.7840/kics.2016.41.2.277
- 최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템 vol.42, pp.1, 2015, https://doi.org/10.7840/kics.2017.42.1.98