메뉴 건너뛰기




Volumn 10, Issue 2, 2002, Pages 225-254

Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management

Author keywords

Data warehousing and statistical methods in management; Distributed denial of service attacks; Information modeling; Intrusion detection; Network and systems monitoring; Security management

Indexed keywords

DATA WAREHOUSING AND STATISTICAL METHODS IN MANAGEMENT; DISTRIBUTED DENIAL OF SERVICE ATTACKS; INFORMATION MODELING; INTRUSION DETECTION; NETWORK AND SYSTEMS MONITORING; SECURITY MANAGEMENT;

EID: 0013264090     PISSN: 10647570     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1015910917349     Document Type: Article
Times cited : (42)

References (35)
  • 1
    • 0023294428 scopus 로고
    • An intrusion detection model
    • February
    • D. Denning, An intrusion detection model, IEEE Transactions on Software Engineering, Vol. 13, No. 2, pp. 222-232, February 1987.
    • (1987) IEEE Transactions on Software Engineering , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 3
    • 0034588633 scopus 로고    scopus 로고
    • On the trail of intrusions into information systems
    • December
    • S. Kent, On the trail of intrusions into information systems, IEEE Spectrum, pp. 52-56, December 2000.
    • (2000) IEEE Spectrum , pp. 52-56
    • Kent, S.1
  • 5
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • Carnegie Mellon University, Software Engineering Institute, January
    • J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, State of the practice of intrusion detection technologies, Technical Report CMU/SEI-99-TR-028, Carnegie Mellon University, Software Engineering Institute, January 2000.
    • (2000) Technical Report , vol.CMU-SEI-99-TR-028
    • Allen, J.1    Christie, A.2    Fithen, W.3    McHugh, J.4    Pickel, J.5    Stoner, E.6
  • 10
    • 84862341314 scopus 로고    scopus 로고
    • Using MIB II variables for network intrusion detection
    • D. Barbará and S. Jajodia, eds., Kluwer Academic Publishers, Boston, in press
    • X. Qin, W. Lee, L. Lewis, and J. B. D. Cabrera, Using MIB II variables for network intrusion detection. D. Barbará and S. Jajodia, eds., Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, 2002 (in press).
    • (2002) Applications of Data Mining in Computer Security
    • Qin, X.1    Lee, W.2    Lewis, L.3    Cabrera, J.B.D.4
  • 11
    • 1942531190 scopus 로고    scopus 로고
    • Proactive intrusion detection - A study on temporal data mining
    • D. Barbara and S. Jajodia, eds., Kluwer Academic Publishers, Boston, in press
    • J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, and R. K. Mehra, Proactive intrusion detection - A study on temporal data mining. D. Barbara and S. Jajodia, eds., Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, 2002 (in press).
    • (2002) Applications of Data Mining in Computer Security
    • Cabrera, J.B.D.1    Lewis, L.2    Qin, X.3    Lee, W.4    Mehra, R.K.5
  • 14
    • 1942531189 scopus 로고    scopus 로고
    • Science and Technology Section, Internet security - Anatomy of an attack
    • February 19
    • Science and Technology Section, Internet security - Anatomy of an attack, The Economist, pp. 80-81, February 19, 2000.
    • (2000) The Economist , pp. 80-81
  • 16
    • 0008723266 scopus 로고    scopus 로고
    • Distributed denial of service - Trin00, Tribe flood network, tribe flood network 2000, and Stacheldraht
    • CIAC-2319, Department of Energy - Computer Incident Advisory Capability, (CIAC) February
    • P. J. Criscuolo, Distributed denial of service - Trin00, Tribe flood network, tribe flood network 2000, and Stacheldraht, Technical Report CIAC-2319, Department of Energy - Computer Incident Advisory Capability, (CIAC) February 2000.
    • (2000) Technical Report
    • Criscuolo, P.J.1
  • 22
    • 0000351727 scopus 로고
    • Investigating causal relations by econometric models and cross-spectral methods
    • C. W. J. Granger, Investigating causal relations by econometric models and cross-spectral methods, Econometrica, Vol. 34, pp. 424-438, 1969.
    • (1969) Econometrica , vol.34 , pp. 424-438
    • Granger, C.W.J.1
  • 26
    • 0032154135 scopus 로고    scopus 로고
    • Proactive anomaly detection using distributed agents
    • September
    • M. Thottan and C. Ji, Proactive anomaly detection using distributed agents, IEEE Network, pp. 21-27, September 1998.
    • (1998) IEEE Network , pp. 21-27
    • Thottan, M.1    Ji, C.2
  • 28
    • 0035728158 scopus 로고    scopus 로고
    • The monitoring, detection, interpretation and response paradigm for the security of battlespace networks
    • Washington, D.C., October
    • J. B. D. Cabrera, L. J. Popyack, Jr., L. Lewis, B. Ravichandran, and R. K. Mehra, The monitoring, detection, interpretation and response paradigm for the security of battlespace networks, Proceedings of IEEE MILCOM 2001, Washington, D.C., October 2001.
    • (2001) Proceedings of IEEE MILCOM 2001
    • Cabrera, J.B.D.1    Popyack Jr., L.J.2    Lewis, L.3    Ravichandran, B.4    Mehra, R.K.5
  • 35
    • 0033723713 scopus 로고    scopus 로고
    • ISCP: Design and implementation of an inter-domain Security Management Agent (SMA) coordination protocol
    • IEEE Publishing
    • Z. Fu, H. Huang, T. Wu, S. Wu, F. Gong, C. Xu, and I. Baldine, ISCP: Design and implementation of an inter-domain Security Management Agent (SMA) coordination protocol, IEEE Publishing, Proceedings of NOMS, 2000.
    • (2000) Proceedings of NOMS
    • Fu, Z.1    Huang, H.2    Wu, T.3    Wu, S.4    Gong, F.5    Xu, C.6    Baldine, I.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.