메뉴 건너뛰기




Volumn 17, Issue 5, 2000, Pages 42-51

Defending yourself: The role of intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER ARCHITECTURE; COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER SYSTEMS PROGRAMMING;

EID: 0034270431     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/52.877859     Document Type: Article
Times cited : (145)

References (15)
  • 2
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Feb
    • D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., Vol. SE-13, No. 2, Feb. 1987, pp. 222-232.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 3
    • 0003914522 scopus 로고    scopus 로고
    • Tech Report CMU/ SEI-99-TR-028, Carnegie Mellon Univ., Software Engineering Inst., Pittsburgh
    • J. Allen et al., State of the Practice of Intrusion Detection Technologies, Tech Report CMU/ SEI-99-TR-028, Carnegie Mellon Univ., Software Engineering Inst., Pittsburgh, 2000.
    • (2000) State of the Practice of Intrusion Detection Technologies
    • Allen, J.1
  • 4
    • 84962260018 scopus 로고    scopus 로고
    • Evaluating intrusion detection systems: The 1998 DAPA offline intrusion detection evaluation
    • IEEE Computer Soc. Press, Los Alamitos, Calif
    • R. Lippmann et al., "Evaluating Intrusion Detection Systems: The 1998 DAPA Offline Intrusion Detection Evaluation," Discex 2000, Vol. 2, IEEE Computer Soc. Press, Los Alamitos, Calif., 2000, pp. 12-26.
    • (2000) Discex 2000 , vol.2 , pp. 12-26
    • Lippmann, R.1
  • 7
    • 0037723173 scopus 로고    scopus 로고
    • Got security?
    • July
    • A. Briney, "Got Security?" Information Security Magazine, Vol 2, No. 7, July 1999, pp. 20-23.
    • (1999) Information Security Magazine , vol.2 , Issue.7 , pp. 20-23
    • Briney, A.1
  • 8
    • 0038399086 scopus 로고    scopus 로고
    • Global security survey: Virus attack
    • July 12
    • A.K. Larson, "Global Security Survey: Virus Attack," Information Week, No. 743, July 12 1999, pp. 42-4, 48, 50, 52-3, 56.
    • (1999) Information Week , vol.743 , pp. 42-44
    • Larson, A.K.1
  • 9
    • 0343207199 scopus 로고    scopus 로고
    • Getting closer to policy-based intrusion detection
    • May
    • C. Boeckman, "Getting Closer to Policy-Based Intrusion Detection," Information Security Bulletin, Vol. 5, No. 4, May 2000, pp. 13-22.
    • (2000) Information Security Bulletin , vol.5 , Issue.4 , pp. 13-22
    • Boeckman, C.1
  • 13
    • 84988782496 scopus 로고    scopus 로고
    • The 1999 darpa offline intrusion detection evaluation
    • LNCS, Springer-Verlag, New York
    • R. Lippmann et al., "The 1999 DARPA Offline Intrusion Detection Evaluation," to be published in RAID 2000, LNCS, Springer-Verlag, New York, No. 1907.
    • RAID 2000 , Issue.1907
    • Lippmann, R.1
  • 14
    • 0242445762 scopus 로고    scopus 로고
    • The 1998 lincoln lab IDS evaluation - A critique
    • LNCS, Springer-Verlag, New York
    • J. McHugh, "The 1998 Lincoln Lab IDS Evaluation - A Critique," to be published in RAID 2000, LNCS, Springer-Verlag, New York, No. 1907, 2000.
    • (2000) RAID 2000 , Issue.1907
    • McHugh, J.1
  • 15
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • R. Durst et al., "Testing and Evaluating Computer Intrusion Detection Systems," Comm. ACM, Vol. 42, No. 7, 1999, pp. 53-61.
    • (1999) Comm. ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.