Network Attack Characteristics of Automatic Data Extraction Technology

Article Preview

Abstract:

attack automatic feature extraction technology is an important research of network security technology. From the network present situation research proceed with, to attack the automatic feature extraction technology for definition and classifycation, and for each category of technology are introduced in detail, and presents several attacks of automatic feature extraction technology, finally to present these technical deficiencies and the possible development trend are discussed.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1245-1248

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] CNCERT/CC. 2007 [DB/OL]. http: /www. cert. org. cn/articles /docs/ network security work report of common/ 2007 082123431. shtml. 2008-02-10.

Google Scholar

[2] Anderson J P. Computer Security Threat Monitoring and Surveillance[R]. James P Anderson Co, Fort Washington, Pennsylvania, (1980).

Google Scholar

[3] CNNIC. twenty-first China Internet development statistical report [DB/OL]. http: /tech. qq. com/zt /2008/cnnic21. 2008-02-18.

Google Scholar

[4] S Staniford, V Paxson, N Weaver. How to own the Internet in Your Spare Time. In: Proc. of the 11th USENIX Security Symposium. CA: USENIX Association Berkeley Publisher, 2002, 149-167.

Google Scholar

[5] YEGNESWARAN V, GIFFIN J T, BARFORD P, et al. An architec-ture for generating semantics-aware signatures[A]. Proceedings of the14th USENIX Security Symposium[C]. Baltimore, MD, USA, 2005. 97-112.

DOI: 10.21236/ada449063

Google Scholar

[6] NEWSOME J, KARP B, SONG D. Polygraph: automatically generat-ing signatures for polymorphic worms[A]. Proceedings of IEEE Sym-posium on Security and Privacy[C]. Washington, DC, USA, IEEEComputer Society, 2005. 226-241.

DOI: 10.1109/sp.2005.15

Google Scholar

[7] Kreibich C,Crowcroft J.Honeycomb creating intrusion detection signatures using honeypot.In: Proc. of the 2nd Workshop on Hot Topics in Networks,Boston: HotNets-II, 2003, 51-56.

Google Scholar

[8] Hyang-Ah Kim, Brad Karp. Autograph: Toward automated, distributed worm signature detection. In: Proc. of the 13th USENIX Security Symposium. San Diego: USENIX Press, 2004, 271-286.

Google Scholar

[9] Piotr Kijewski. Automated Extraction of Threat Signatures from Network Flows. In: Proc. of the 18th Annual FIRST Conference. Baltimore: CERT, 2006, 261–271.

Google Scholar

[10] Urjita Thakar. Honey analyzer - analysis and extraction of intrusion detection patterns & signatures using honeypot.In: Proc. of the 2nd International Conference on Innovations in Information Technology. Shri GS: Institute of Technology and Science, 2005, 88-104.

Google Scholar

[11] Singh S, Estan C, Varghese G, Savage S. Automated worm fingerprinting. In: Proc. of the 6th Symposium on Operating Systems Design and Implementation. San Francisco: USENIX Association , 2004, 45-60.

Google Scholar