共 32 条
[1]
Abbes T., Bouhoula A., Rusinowitch M., On the fly pattern matching for intrusion detection with snort, Annals of Telecommunications, 59, 9-10, pp. 941-967, (2004)
[2]
Aho A., Corasick M., Efficient string matching: An aid to bibliographic search, Communications of the ACM, 18, 6, pp. 333-340, (1975)
[3]
Albitz P., Liu C., DNS and BIND, (2001)
[4]
Anagnostakis K.G., Markatos E.P., Antonatos S., Polychronakis M., E2xB: A domain-specific string matching algorithm for intrusion detection, Proceedings of the 18th IFIP International Information Security Conference (SEC2003), pp. 217-228, (2003)
[5]
Boyer R.S., Moore J.S., A fast string searching algorithm, Communications of the ACM, 20, 10, pp. 762-772, (1977)
[6]
Coit C., Staniford S., McAlerney J., Towards faster string matching for intrusion detection or exceeding the speed of snort, DARPA Information Survivability Conference and Exposition, 1, (2001)
[7]
Crochemore M., Czumaj A., Gasieniec L., Lecroq T., Plandowski T., Rytter W., Fast practical multi-pattern matching, Information Processing Letters, 71, pp. 3-4, (1999)
[8]
Crochemore M., Rytter W., Text Algorithms, (1994)
[9]
Dreger H., Feldmann A., Mai M., Paxson V., Sommer R., Dynamic application-layer protocol analysis for network intrusion detection, Proceedings of the 15th USENIX Security Symposium, pp. 257-272, (2006)
[10]
Elz R., Bush R., RFC 2181: Clarifications to the DNS Specification, (1997)