시그니처 기반 침입 탐지 시스템의 최적화

  • Published : 2015.06.15

Abstract

Keywords

References

  1. J. Mirkovic and P. Reiher. "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review. Vol. 34, No. 2, pp 39-53, 2004. https://doi.org/10.1145/997150.997156
  2. C. Tankard. "Advanced persistent threats and how to monitor and deter them", Network security. 2011(8), pp 16-19, 2011. https://doi.org/10.1016/S1353-4858(11)70086-1
  3. A. Young and M. Yung, "Cryptovirology: extortion-based security threats and countermeasures", IEEE Symposium on Security and Privacy. pp. 129-140, 1996
  4. Snort http://www.snort.org
  5. Bro IDS. http://www.bro.org
  6. Suricata: Open Source IDS/IPS/NSM engine. http://suricata-ids.org
  7. P. Dlugosch et al. "An efficient and scalable semiconductor architecture for parallel automata processing", IEEE Transaction on Parallel and Distributed Systems, Vol. 25, No. 12, pp. 3088-3098, 2014. https://doi.org/10.1109/TPDS.2014.8
  8. M. Jamshed et al. "Kargus: A Highly-scalable Software-based Intrusion Detection System", ACM Conference on Computer and Communications Security 2012, pp. 317-328, 2012.
  9. D. Knuth et al. "Fast pattern matching in Strings", SIAM Journal on Computing Vol. 6, No. 2, pp. 323-350, 1977 https://doi.org/10.1137/0206024
  10. A. Aho and M. J. Corasick. "Efficient string matching: an aid to bibliographic search", Communications of ACM, Vol. 18, No. 6, pp. 333-340, 1975. https://doi.org/10.1145/360825.360855
  11. L. Pitt and M. K. Warmuth. "The minimum consistent DFA problem cannot be approximated within any polynomial", Journal of ACM VoI. 40, No. 1, pp. 95-142, 1993 . https://doi.org/10.1145/138027.138042
  12. L. J. Stockmeyer and A. R. Meyer. "Word problems requiring exponential time:preliminary report", Symposium on the Theory of Computing 1973, pp. 1-9, 1973.
  13. 한지용, 이인복, 한정희. Signature-Based IDS의 PCRE 성능 개선 방안. 정보과학회 논문지: 시스템 및 이론 Vol. 40, No. 2, pp. 53-60, 2013
  14. J. Mendivelso et al. Finding overlaps within regular expressions with variable-Iength gaps. ACM Research in Adaptive and Convergent Systems 2013, pp. 16-21, 2013
  15. J. Lee et al. Measuring similarities among intrusion detection rules on the MapReduce environment. ACM Research in Adaptive and Convergent Systems 2014, pp. 58-60, 2014.
  16. 조호성, 오성일, 이인복, 박희진, 나중채. "Snort 기반 탐지 규칙의 유사성 분석 프로그램 개발 및 활용", 한국차세대컴퓨팅학회 논문지 Vol. 11, No. 1, pp. 32-43, 2015.
  17. V. C. Valgenti et al. "REduce: Removing redundancy from regular expression mathching in network security", International Conference on Computer Communications and Networks 2015, to appear.