References
- US Department of Defense Cyber Strategy, US Department of Defense, pp. 2-8, 2015.
- Linux IP Firewalling Chains. http://people.netfilter.org/rusty/ipchains (accessed Sept., 25, 2019).
- Netfilter: firewalling, NAT, and packet mangling for Linux. http://www.netfilter.org (accessed Sept., 25, 2019).
- K. Wang, "Anomalous Payload -Based Network Intrusion Detection," Recent Advances in Intrusion Detection. Springer Berlin. doi:10.1007/978-3-540-30143-1_11.
- R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee, "McPAD : A Multiple Classification System for Accurate Payload-based Anomaly Detection," Computer Networks, Special Issue on Traffic Classification and Its Applications to Modern Networks, vol. 5, no. 6, pp. 864-881, 2009.
- AV-TEST: Malware statistics. http://www.av-test.org/en/statistics/malware (accessed Sept., 25, 2019).
- K.H. Lee and G.S. Ryu, "Research for improving vulnerability of unmanned aerial vehicles," Smart Media Journal, vol. 7, no. 3, pp. 64-71, 2018 https://doi.org/10.30693/SMJ.2018.7.3.64
- W.J. Joe, H.J. Shin, and H.S. Kim, "A log visualization method for network security monitoring," Smart Media Journal, vol. 7, no. 4, pp. 70-78, 2018
- S.I. Bae and E.G. Im, "Unpacking Technique for In-memory malware injection technique," Smart Media Journal, vol. 8, no. 1, pp. 19-26, 2019
- Snort: Network intrusion detection and prevention system. http://www.snort.org (accessed Sept., 25, 2019).
- The Bro Network Security Monitor. https://www.bro.org (accessed Sept., 25, 2019).
- Suricata: Open IDS / IPS / NSM engine. https://suricata-ids.org (accessed Sept., 25, 2019).
- G. Navarro, "A guided tour to approximate string matching," ACM Computing Surveys, vol. 33, no. 1, pp. 31-88, 2001 https://doi.org/10.1145/375360.375365
- E.W. Myers, "A Four Russians Algorithm for Regular Expression Pattern Matching," Journal of ACM, vol. 39, no. 2, pp. 430-448, 1992 https://doi.org/10.1145/128749.128755
- D. Belazzougui and M. Raffinot, "Approximate regular expression matching with multi-strings," Journal of Discrete Algorithms, vol. 18, pp. 14-21, 2013 https://doi.org/10.1016/j.jda.2012.07.008
- H. Altwaijry and K. Shahbar, "Automatic SNORT Signatures Generation by using Honeypot," Journal of Computers , vol. 8, no. 12, pp. 3280-3286, 2013
- B. Rice, "Automated Snort Signature Generation", Masters Theses, James Madison University, 2014
- S. Ashfaq, M.U. Farooq, and A. Karim, "Efficient rule generation for cost-sensitive misuse detection using genetic algorithms," Proc. of CIS, pp. 282-285, 2006
- H.A. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," USENIX Security Symposium, pp. 271-286, 2004
- C. Schensted, "Longest increasing and decreasing subsequences," Canadian Journal of Mathematics, vol. 13, pp. 179-191, 1961 https://doi.org/10.4153/CJM-1961-015-3
- R.M. Karp and M.O. Rabin, "Efficient randomized pattern-matching algorithms," IBM Journal of Research and Development, vol.31, no. 2, pp. 249-260, 1987 https://doi.org/10.1147/rd.312.0249
- Sniffles: Capture Generator for IDS and Regular Expression Evaluation. https://github.com/petabi/sniffles (accessed Sept., 25, 2019).
- M. Shao, M.S. Kim, V.C. Valgenti, and J. Park, "Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems," IEICE Transactions on Information and Systems, vol. 99-D, no. 8, pp. 2090-2099, 2016
- tcpdump and libpcap. http://www.tcpdump.org (accessed Sept., 25, 2019).