PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Application of bioinformatics methods to recognition of network threats

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Bioinformatics is a large group of methods used in biology, mostly for analysis of gene sequences. The algorithms developed for this task have recently found a new application in network threat detection. This paper is an introduction to this area of research, presenting a survey of bioinformatics methods applied to this task, outlining the individual tasks and methods used to solve them. It is argued that the early conclusion that such methods are ineffective against polymorphic attacks is in fact too pessimistic.
Rocznik
Tom
Strony
23--27
Opis fizyczny
Bibliogr. 13 poz.
Twórcy
autor
autor
autor
Bibliografia
  • [1] N. C. Jones and P. A. Pevzner, An Introduction to Bioinformatics Algorithms. Cambridge: MIT Press, 2004.
  • [2] D. Gusfield, Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology. Cambridge: Cambridge University Press, 1997.
  • [3] V. I. Levenshtein, “Binary codes capable of correcting insertions and reversals”, Sov. Phys. Dokl., vol. 10, no. 8, pp. 707–710, 1966.
  • [4] P. Kijewski, “Zastosowanie metod bioinformatyki do rozpoznawania zagrożeń sieciowych”, in SECURE 2006 Bezpieczeństwo – czas na przełom, Warsaw, Poland, 2006 (in Polish).
  • [5] S. Coull, J. Branch, B. Szymański, and E. Breimer, “Intrusion detection: a bioinformatics approach”, in Proc. 19th Ann. Comput. Secur. Appl. Conf., Washington, USA, 2003.
  • [6] D. Gao, M. K. Reiter, and D. Song, “Behavioral distance for intrusion detection”, in Proc. 8th Int. Symp. Recent Adv. Intrus. Detect. RAID 2005, Seattle, USA, 2005.
  • [7] D. Gao, M. K. Reiter, and D. Song, “Behavioral distance measurement using hidden Markov models”, in Proc. 9th Int. Symp. Recent Adv. Intrus. Detect. RAID 2006, Hamburg, Germany, 2006.
  • [8] C. Kreibich and J. Crowcroft, “Honeycomb – creating intrusion detection signatures using honeypots”, in Proc. 2nd Worksh. Hot Top. Netw. Hotnets II. ACM SIGCOMM, Boston, USA, 2003.
  • [9] J. Newsome, B. Karp, and D. Song, “Polygraph – automatically generating signatures for polymorphic worms”, in Proc. IEEE Symp.Secur. Priv. SP 2005, Washington, USA, 2005, pp. 226–241.
  • [10] Y. Tang and S. Chen, “Defending against Internet worms: a signature-based approach”, in Proc. 24th Ann. Conf. IEEE INFOCOM 2005, Miami, USA, 2005.
  • [11] P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, “The nepenthes platform: an efficient approach to collect malware”, in Proc. 9th Int. Symp. Recent Adv. Intrus. Detect. RAID 2006, Hamburg, Germany, 2006.
  • [12] C. Leita, K. Mermoud, and M. Dacier, “ScriptGen: an automated script generation tool for honeyd”, in Proc. 21st Ann. Comput. Secur. Appl. Conf. ACSAC 2005, Tucson, USA, 2005.
  • [13] C. Leita, M. Dacier, and F. Massicotte, “Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots”, in Proc. 9th Int. Symp. Recent Adv. Intrus. Detect. RAID 2006, Hamburg, Germany, 2006.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT8-0010-0011
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.