Article citationsMore>>
Brumley, D., Newsome, J., Song, D., Wang, H. and Jha, S. (2008) Theory and Techniques for Automatic Generation of Vulnerability Based Signatures. IEEE Transactions on Dependable and Secure Computing, 5, 224-241. http://dx.doi.org/10.1109/TDSC.2008.55
has been cited by the following article:
-
TITLE:
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
AUTHORS:
Andrew Blyth
KEYWORDS:
Network Security; Firewalls; Proxies and Intrusion Detection
JOURNAL NAME:
Journal of Information Security,
Vol.5 No.2,
March
12,
2014
ABSTRACT:
With the increasing use of novel exploitation
techniques in modern malicious software it can be argued that current intrusion
detection and intrusion prevention systems are failing to keep pace. While some
intrusion prevention systems have the capability to detect evasion techniques
they all fail to detect novel unknown exploitation techniques. Traditional
proxy approaches have failed to protect the universe of discourse that a
network enabled service can be engaged in as they view all information flows of
the same type in a uniform manner. In this paper we propose a micro-proxy
architecture that utilizes reverse engineering techniques to identify a valid
universe of discourse for a network service. This valid universe of discourse
is then applied to validate legitimate transactions to a service. Thus in
effect, the micro proxy implements a default deny
policy via the analysis of the application level discourse.
Related Articles:
-
Xiukun Wei, Kun Guo, Limin Jia, Guangwu Liu, Minzheng Yuan
-
Gang Li, Changhai Yu, Hui Fan, Shuguo Gao, Yu Song, Yunpeng Liu
-
Chao Wu, Qing Wu, Feng Ma, Shuwu Wang
-
Sioudina Mandibaye, Alidou Razakou Ibourahima Boro, Hergie Alexis Seguedeme
-
Nan Li, Chunhe Xia, Yi Yang, HaiQuan Wang