메뉴 건너뛰기




Volumn 9, Issue 4, 1997, Pages 661-667

On a pattern-oriented model for intrusion detection

Author keywords

Access misuse; Audit analysis; Context dependent intrusion; Intrusion detection; Operational security problems; Rule based methods; Secure systems; Statistical methods

Indexed keywords

COMPUTER SYSTEMS; DATA HANDLING; KNOWLEDGE BASED SYSTEMS; PATTERN RECOGNITION; STATISTICAL METHODS;

EID: 0031190354     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/69.617059     Document Type: Article
Times cited : (55)

References (22)
  • 3
    • 33748184885 scopus 로고
    • NIDX - A Real-Time Intrusion Detection Expert System
    • San Francisco, June
    • D.S. Bauer and M.E. Koblentz, "NIDX - A Real-Time Intrusion Detection Expert System," Proc. Summer Usenix, San Francisco, pp. 261-273, June 1988.
    • (1988) Proc. Summer Usenix , pp. 261-273
    • Bauer, D.S.1    Koblentz, M.E.2
  • 4
    • 33748176993 scopus 로고
    • technical report, Dept. of Computer Sciences, Purdue Univ., West Lafayette, Ind.
    • M. Bishop, "Security Problems with the Unix Operating System," technical report, Dept. of Computer Sciences, Purdue Univ., West Lafayette, Ind., pp. 1-28, 1983.
    • (1983) Security Problems with the Unix Operating System , pp. 1-28
    • Bishop, M.1
  • 5
    • 0242697705 scopus 로고
    • How to Write a Setuid Program
    • M. Bishop, "How To Write a Setuid Program," Proc. Winter Usenix, vol. 12, no. 1, pp. 5-11, 1987
    • (1987) Proc. Winter Usenix , vol.12 , Issue.1 , pp. 5-11
    • Bishop, M.1
  • 6
    • 79960166575 scopus 로고
    • Theft of Information in the Take-Grant Protection Model
    • Franconia, N.H., June
    • M. Bishop, "Theft of Information in the Take-Grant Protection Model," Proc. Computer Security Foundations Workshop, Franconia, N.H., pp. 194-218, June 1988.
    • (1988) Proc. Computer Security Foundations Workshop , pp. 194-218
    • Bishop, M.1
  • 7
  • 8
    • 0023294428 scopus 로고
    • An Intrusion Detection Model
    • Feb.
    • D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol 13, no. 2, pp. 222-226, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 222-226
    • Denning, D.E.1
  • 10
    • 0023293654 scopus 로고
    • Design and Implementation of Secure XENIX
    • Feb.
    • V.D. Gligor et al.," Design and Implementation of Secure XENIX," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 208-221, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 208-221
    • Gligor, V.D.1
  • 11
    • 0029267472 scopus 로고
    • State Transition Analysis: A Rule-Based Intrusion Detection Approach
    • Mar. This paper is an extended version of two previous conference papers
    • K. Ilgun, P.A. Porras, and R.A. Kemmerer, "State Transition Analysis: A Rule-Based Intrusion Detection Approach," IEEE Trans. Software Eng., vol. 21, no. 3, pp. 181-199, Mar. 1995. (This paper is an extended version of two previous conference papers:
    • (1995) IEEE Trans. Software Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Porras, P.A.2    Kemmerer, R.A.3
  • 12
    • 84873309550 scopus 로고
    • Penetration State Transition Analysis: A Rule-Based Intrusion Detection Approach
    • San Antonio, Texas, Dec.
    • P.A. Porras and R.A. Kemmerer, "Penetration State Transition Analysis: A Rule-Based Intrusion Detection Approach," Proc. Eighth Ann. Computer Security Applications Conf., San Antonio, Texas, pp. 220-229, Dec. 1992;
    • (1992) Proc. Eighth Ann. Computer Security Applications Conf. , pp. 220-229
    • Porras, P.A.1    Kemmerer, R.A.2
  • 13
  • 15
    • 0023866666 scopus 로고
    • A Prototype Real Time Intrusion Detection Expert System
    • Oakland, Calif., Apr.
    • T.F. Lunt and R. Jagannathan, "A Prototype Real Time Intrusion Detection Expert System," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 59-66, Apr. 1988.
    • (1988) Proc. IEEE Symp. Security and Privacy , pp. 59-66
    • Lunt, T.F.1    Jagannathan, R.2
  • 16
    • 0003111439 scopus 로고
    • Automated Audit Trail Analysis and Intrusion Detection: A Survey
    • Baltimore, Oct.
    • T.F. Lunt, "Automated Audit Trail Analysis and Intrusion Detection: A Survey," Proc. 11th Nat'l Computer Security Conf., Baltimore, pp. 65-73, Oct. 1988.
    • (1988) Proc. 11th Nat'l Computer Security Conf. , pp. 65-73
    • Lunt, T.F.1
  • 17
    • 0026156486 scopus 로고
    • A Pattern-Oriented Intrusion Detection System and Its Applications
    • Oakland, Calif., May
    • S.P. Shieh and V.D. Gligor, "A Pattern-Oriented Intrusion Detection System and Its Applications," Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 327-342, May 1991.
    • (1991) Proc. IEEE Symp. Research in Security and Privacy , pp. 327-342
    • Shieh, S.P.1    Gligor, V.D.2
  • 20
    • 0019713652 scopus 로고
    • Theft and Conspiracy in the Take-Grant Protection Model
    • Dec.
    • L. Snyder, "Theft and Conspiracy in the Take-Grant Protection Model," J. Computer and System Sciences, vol. 23, pp. 333-347, Dec. 1981.
    • (1981) J. Computer and System Sciences , vol.23 , pp. 333-347
    • Snyder, L.1
  • 21
    • 0024984441 scopus 로고
    • Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns
    • Oakland, Calif., May
    • S.H. Teng, K. Chen, and S.C. Lu, "Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns," Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 278-284, May 1990.
    • (1990) Proc. IEEE Symp. Research in Security and Privacy , pp. 278-284
    • Teng, S.H.1    Chen, K.2    Lu, S.C.3
  • 22
    • 0024665277 scopus 로고
    • Detection of Anomalous Computer Session Activity
    • Oakland, Calif., May
    • H.S. Vaccaro and G.E. Liepins, "Detection of Anomalous Computer Session Activity," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 280-289, May 1989.
    • (1989) Proc. IEEE Symp. Security and Privacy , pp. 280-289
    • Vaccaro, H.S.1    Liepins, G.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.