Modeling NIDS Evasion with Genetic Programming

Proceeding of: 9th International Conference on Security and Management (SAM 2010). Las Vegas, Nevada, USA, July 12-15 2010

[1]  Vern Paxson,et al.  Active mapping: resisting NIDS evasion without altering traffic , 2003, 2003 Symposium on Security and Privacy, 2003..

[2]  Andrew H. Sung,et al.  Modeling intrusion detection systems using linear genetic programming approach , 2004 .

[3]  Peter Mell,et al.  NIST Special Publication on Intrusion Detection Systems , 2001 .

[4]  George Varghese,et al.  Detecting evasion attacks at high speeds without reassembly , 2006, SIGCOMM 2006.

[5]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[6]  David M. Watson,et al.  Protocol scrubbing: network security through transparent flow modification , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[7]  Mark Handley,et al.  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.

[8]  Ron Kohavi,et al.  A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.

[9]  George Varghese,et al.  Detecting evasion attacks at high speeds without reassembly , 2006, SIGCOMM.

[10]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[11]  Eugene H. Spafford,et al.  Applying Genetic Programming to Intrusion Detection , 1995 .

[12]  Giandomenico Spezzano,et al.  GP Ensemble for Distributed Intrusion Detection Systems , 2005, ICAPR.

[13]  Chih-Hung Lin,et al.  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems , 2008, DIMVA.

[14]  John R. Koza,et al.  Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.

[15]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[16]  Stefano Giordano,et al.  Counting bloom filters for pattern matching and anti-evasion at the wire speed , 2009, IEEE Network.

[17]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[18]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[19]  Hari Balakrishnan,et al.  Efficient and Robust TCP Stream Normalization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[20]  Andrew H. Sung,et al.  Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach , 2004, IEA/AIE.

[21]  Arturo Ribagorda,et al.  Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming , 2010, 2010 International Conference on Availability, Reliability and Security.

[22]  Juan E. Tapiador,et al.  Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming , 2009, EvoWorkshops.