최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회지 = Communications of the Korean Institute of Information Scientists and Engineers, v.33 no.6, 2015년, pp.55 - 60
초록이 없습니다.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
J. Mirkovic and P. Reiher. "A taxonomy of DDoS attack and DDoS defense mechanisms", ACM SIGCOMM Computer Communication Review. Vol. 34, No. 2, pp 39-53, 2004.
C. Tankard. "Advanced persistent threats and how to monitor and deter them", Network security. 2011(8), pp 16-19, 2011.
A. Young and M. Yung, "Cryptovirology: extortion-based security threats and countermeasures", IEEE Symposium on Security and Privacy. pp. 129-140, 1996
Snort http://www.snort.org
Bro IDS. http://www.bro.org
Suricata: Open Source IDS/IPS/NSM engine. http://suricata-ids.org
P. Dlugosch et al. "An efficient and scalable semiconductor architecture for parallel automata processing", IEEE Transaction on Parallel and Distributed Systems, Vol. 25, No. 12, pp. 3088-3098, 2014.
M. Jamshed et al. "Kargus: A Highly-scalable Software-based Intrusion Detection System", ACM Conference on Computer and Communications Security 2012, pp. 317-328, 2012.
D. Knuth et al. "Fast pattern matching in Strings", SIAM Journal on Computing Vol. 6, No. 2, pp. 323-350, 1977
A. Aho and M. J. Corasick. "Efficient string matching: an aid to bibliographic search", Communications of ACM, Vol. 18, No. 6, pp. 333-340, 1975.
L. Pitt and M. K. Warmuth. "The minimum consistent DFA problem cannot be approximated within any polynomial", Journal of ACM VoI. 40, No. 1, pp. 95-142, 1993 .
L. J. Stockmeyer and A. R. Meyer. "Word problems requiring exponential time:preliminary report", Symposium on the Theory of Computing 1973, pp. 1-9, 1973.
한지용, 이인복, 한정희. Signature-Based IDS의 PCRE 성능 개선 방안. 정보과학회 논문지: 시스템 및 이론 Vol. 40, No. 2, pp. 53-60, 2013
J. Mendivelso et al. Finding overlaps within regular expressions with variable-Iength gaps. ACM Research in Adaptive and Convergent Systems 2013, pp. 16-21, 2013
J. Lee et al. Measuring similarities among intrusion detection rules on the MapReduce environment. ACM Research in Adaptive and Convergent Systems 2014, pp. 58-60, 2014.
조호성, 오성일, 이인복, 박희진, 나중채. "Snort 기반 탐지 규칙의 유사성 분석 프로그램 개발 및 활용", 한국차세대컴퓨팅학회 논문지 Vol. 11, No. 1, pp. 32-43, 2015.
V. C. Valgenti et al. "REduce: Removing redundancy from regular expression mathching in network security", International Conference on Computer Communications and Networks 2015, to appear.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.