메뉴 건너뛰기




Volumn 21, Issue 3, 1995, Pages 181-199

State Transition Analysis: A Rule-Based Intrusion Detection Approach

Author keywords

expert systems; intrusion detection; Security

Indexed keywords

COMPUTER SIMULATION; COMPUTER SYSTEMS; GRAPHIC METHODS; KNOWLEDGE BASED SYSTEMS; REAL TIME SYSTEMS; SECURITY OF DATA; UNIX;

EID: 0029267472     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/32.372146     Document Type: Article
Times cited : (516)

References (34)
  • 2
    • 84937648928 scopus 로고
    • [Restricted Distribution], Dep. Comput. Sci., Purdue Univ., West Lafayette, IN, Apr.
    • M. Bishop, Security Problem with the UNIX Operating System [Restricted Distribution], Dep. Comput. Sci., Purdue Univ., West Lafayette, IN, Apr. 1982.
    • (1982) Security Problem with the UNIX Operating System
    • Bishop, M.1
  • 3
    • 0024984441 scopus 로고
    • Adaptive real-time anomaly detection using inductively generated sequential patterns
    • Oakland, CA, May
    • K. Chen, S. C. Lu, and H. S. Teng, “Adaptive real-time anomaly detection using inductively generated sequential patterns,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1990, pp. 278-295.
    • (1990) Proc. IEEE Symp. Res. Security, Privacy , pp. 278-295
    • Chen, K.1    Lu, S.C.2    Teng, H.S.3
  • 4
    • 0026850007 scopus 로고
    • A neural network component for an intrusion detection system
    • Oakland, CA, May
    • H. Debar, M. Becker, and D. Siboni, “A neural network component for an intrusion detection system,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1992, pp. 240-258
    • (1992) Proc. IEEE Symp. Res. Security, Privacy , pp. 240-258
    • Debar, H.1    Becker, M.2    Siboni, D.3
  • 6
    • 84937652725 scopus 로고
    • [Restricted Distribution], Comput. Sci. Dep., Univ. Calif., Santa Barbara, Apr.
    • A. V. Discolo, 4.2 BSD UNIX Security, [Restricted Distribution], Comput. Sci. Dep., Univ. Calif., Santa Barbara, Apr. 1985.
    • (1985) 4.2 BSD UNIX Security
    • Discolo, A.V.1
  • 7
    • 0013193905 scopus 로고
    • The COPS security checker system
    • Anaheim, CA, June
    • D. Farmer and E. H. Spafford, “The COPS security checker system,” in Proc. Summer 1990 Usenix Conf., Anaheim, CA, June 1990, pp. 305-312.
    • (1990) Proc. Summer 1990 Usenix Conf. , pp. 305-312
    • Farmer, D.1    Spafford, E.H.2
  • 10
    • 0344235646 scopus 로고
    • Final Tech. Rep. RADC-TR-90-413, Trusted Inform. Syst., Inc., Dec.
    • B. Hubbard et al, “Computer system intrusion detection,” Final Tech. Rep. RADC-TR-90-413, Trusted Inform. Syst., Inc., Dec. 1990.
    • (1990) “Computer system intrusion detection,”
    • Hubbard, B.1
  • 11
    • 0039952569 scopus 로고
    • An expert system application for network intrusion detection
    • (Baltimore, MD), Oct.
    • K. A. Jackson, D. H. DuBois, and C. A. Stalling, “An expert system application for network intrusion detection,” in Proc. 14th Nat. Comput. Security Conf. (Baltimore, MD), Oct. 1991, pp. 215-225.
    • (1991) Proc. 14th Nat. Comput. Security Conf. , pp. 215-225
    • Jackson, K.A.1    DuBois, D.H.2    Stalling, C.A.3
  • 12
    • 0026154682 scopus 로고
    • The SRI IDES statistical anomaly detector
    • (Oakland, CA), May
    • H. S. Javitz and A. Valdes, “The SRI IDES statistical anomaly detector,” in Proc. IEEE Res. Security, Privacy (Oakland, CA), May 1991, pp. 316-376.
    • (1991) Proc. IEEE Res. Security, Privacy , pp. 316-376
    • Javitz, H.S.1    Valdes, A.2
  • 13
    • 0003521691 scopus 로고
    • Static analysis virus detection tools for UNIX systems
    • Baltimore, MD, Oct.
    • P. Kerchen et al., “Static analysis virus detection tools for UNIX systems,” in Proc. 13th Nat. Comput. Security Conf., Baltimore, MD, Oct. 1990, pp. 350-365.
    • (1990) Proc. 13th Nat. Comput. Security Conf. , pp. 350-365
    • Kerchen, P.1
  • 15
    • 0027150412 scopus 로고
    • USTAT: A real-time intrusion detection system for UNIX
    • Oakland, CA, May
    • K. Ilgun, “USTAT: A real-time intrusion detection system for UNIX,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1993, pp. 16-28.
    • (1993) Proc. IEEE Symp. Res. Security, Privacy , pp. 16-28
    • Ilgun, K.1
  • 16
    • 0003111439 scopus 로고
    • Automated audit trail analysis and intrusion detection: A survey
    • Baltimore, MD, Oct.
    • T. F. Lunt, “Automated audit trail analysis and intrusion detection: A survey,” in Proc. 11th Nat. Comput. Security Conf., Baltimore, MD, Oct. 1988, pp. 65-73.
    • (1988) Proc. 11th Nat. Comput. Security Conf. , pp. 65-73
    • Lunt, T.F.1
  • 17
    • 3943093755 scopus 로고
    • Real-time intrusion detection
    • San Francisco, CA, Feb.
    • T. F. Lunt, “Real-time intrusion detection,” in Proc. COMPCON, San Francisco, CA, Feb. 1989.
    • (1989) Proc. COMPCON
    • Lunt, T.F.1
  • 22
    • 33646029915 scopus 로고
    • Is your computer being misused? A survey of current intrusion detection system technology
    • Dec.
    • N. J. McAuliffe et al., “Is your computer being misused? A survey of current intrusion detection system technology,” in Proc. Sixth Comput. Security Applicat. Conf., Dec. 1990, pp. 260-272.
    • (1990) Proc. Sixth Comput. Security Applicat. Conf. , pp. 260-272
    • McAuliffe, N.J.1
  • 26
    • 33749069296 scopus 로고
    • NCSC-TG-004, Version 1, Oct.
    • National Computer Security Center, Glossary of Computer Security Terms, NCSC-TG-004, Version 1, Oct. 1988.
    • (1988) Glossary of Computer Security Terms
  • 28
    • 84873309550 scopus 로고
    • Penetration state transition analysis: A rule-based intrusion detection approach
    • San Antonio, TX, Dec.
    • P. A. Porras and R. A. Kemmerer, “Penetration state transition analysis: A rule-based intrusion detection approach,” in Proc. Eighth Ann. Comput. Security Applicat. Conf., San Antonio, TX, Dec. 1992, pp. 220-229.
    • (1992) Proc. Eighth Ann. Comput. Security Applicat. Conf. , pp. 220-229
    • Porras, P.A.1    Kemmerer, R.A.2
  • 31
    • 0026156486 scopus 로고
    • A pattern-oriented intrusion detection model and its application
    • Oakland, CA, May
    • S. W. Shieh and V. D. Gligor, “A pattern-oriented intrusion detection model and its application,” in Proc. IEEE Res. Security, Privacy, Oakland, CA, May 1991, pp. 327-342.
    • (1991) Proc. IEEE Res. Security, Privacy , pp. 327-342
    • Shieh, S.W.1    Gligor, V.D.2
  • 33
    • 84941476194 scopus 로고
    • Virtual VAX-11 Version, Comput. Sci. Div., Dep. Elec., Comput. Sci., Univ. California, Berkeley, Aug.
    • UNIX Programmer's Manual, 4.2 Berkeley Software Distribution, Virtual VAX-11 Version, Comput. Sci. Div., Dep. Elec., Comput. Sci., Univ. California, Berkeley, Aug. 1983.
    • (1983) UNIX Programmer's Manual, 4.2 Berkeley Software Distribution
  • 34
    • 0024665277 scopus 로고
    • Detection of anomalous computer session activity
    • Oakland, CA, May
    • H. S. Vaccaro and G. E. Liepins, “Detection of anomalous computer session activity,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1989, pp. 280-289.
    • (1989) Proc. IEEE Symp. Res. Security, Privacy , pp. 280-289
    • Vaccaro, H.S.1    Liepins, G.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.