메뉴 건너뛰기




Volumn 34, Issue 4, 2000, Pages 671-697

Intrusion-detection for incident-response, using a military battlefield-intelligence process

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; DATA STRUCTURES; MATHEMATICAL MODELS; MILITARY ELECTRONIC COUNTERMEASURES; SECURITY OF DATA; SIGNAL DETECTION;

EID: 0034300584     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1389-1286(00)00142-0     Document Type: Article
Times cited : (21)

References (36)
  • 3
    • 0008302889 scopus 로고    scopus 로고
    • Use of a taxonomy of security faults
    • COAST Laboratory, Purdue University
    • T. Aslam et al., Use of a taxonomy of security faults, COAST Laboratory, Technical Report TR-96-051, Purdue University, 1996.
    • (1996) Technical Report TR-96-051
    • Aslam, T.1
  • 5
    • 0003956784 scopus 로고
    • Princeton, NJ: Princeton University Press
    • von Clausewitz C. On War. 1832;Princeton University Press, Princeton, NJ.
    • (1832) On War
    • Von Clausewitz, C.1
  • 9
    • 0343472282 scopus 로고    scopus 로고
    • Full text at Carnegie Mellon University, Software Engineering Institute, Security Improvement Module CMU/SEI-SIM-001
    • R. Firth et al., Detecting signs of intrusion, Full text at http://www.cert.org, Carnegie Mellon University, Software Engineering Institute, Security Improvement Module CMU/SEI-SIM-001, 1997.
    • (1997) Detecting Signs of Intrusion
    • Firth, R.1
  • 10
  • 13
    • 84992238930 scopus 로고    scopus 로고
    • Fyodor, nmap
    • Fyodor, nmap, http://www.insecure.org/, 2000.
    • (2000)
  • 14
    • 0004114009 scopus 로고    scopus 로고
    • Full text at CIA, Center for the Study of Intelligence
    • R. Heuer, Psychology of intelligence analysis, Full text at http://www.odci.gov/csi/, CIA, Center for the Study of Intelligence, 1999.
    • (1999) Psychology of Intelligence Analysis
    • Heuer, R.1
  • 15
    • 0031170033 scopus 로고    scopus 로고
    • Collaring the cybercrook: An investigator's view
    • D. Icove, Collaring the cybercrook: An investigator's view, IEEE Spectrum, 1997.
    • (1997) IEEE Spectrum
    • Icove, D.1
  • 19
    • 0343472275 scopus 로고
    • Full text at COAST TR 93-01, Department of Computer Sciences, Purdue University
    • G. Kim et al., The design of a system integrity monitor: Tripwire, Full text at http://www.cerias.purdue.edu/, COAST TR 93-01, Department of Computer Sciences, Purdue University, 1993.
    • (1993) The Design of a System Integrity Monitor: Tripwire
    • Kim, G.1
  • 20
    • 0343472276 scopus 로고    scopus 로고
    • Full text at CarnegieMellonUniversity, SoftwareEngineeringInstitute, SecurityImprovementModuleCMU/SEI-SIM-006
    • K.P. Kossakowski et al., Responding to intrusions, Full text at http://www.cert.org, Carnegie Mellon University, Software Engineering Institute, Security Improvement Module CMU/SEI-SIM-006, 1999.
    • (1999) Responding to Intrusions
    • Kossakowski, K.P.1
  • 21
    • 0030676601 scopus 로고    scopus 로고
    • How to systematically classify computer security intrusions
    • IEEE Computer Society Press, Silver Spring, MD
    • U. Lindqvist et al., How to systematically classify computer security intrusions, in: Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Silver Spring, MD, 1997.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy
    • Lindqvist, U.1
  • 23
    • 0343472277 scopus 로고    scopus 로고
    • Doctrine Division, Full text at US Marine Corps, MCCDC
    • Doctrine Division, MCDP 1-3 Tactics, Full text at http://www.doctrine.usmc.mil, US Marine Corps, MCCDC, 1997.
    • (1997) MCDP 1-3 Tactics
  • 24
    • 0343036486 scopus 로고    scopus 로고
    • Doctrine Division, Full text at US Marine Corps, MCCDC
    • Doctrine Division, MCDP 2 Intelligence, Full text at http://www.doctrine.usmc.mil, US Marine Corps, MCCDC, 1997.
    • (1997) MCDP 2 Intelligence
  • 25
    • 0343036484 scopus 로고
    • US Marine Corps, Marine Corps Institute
    • MCI 7510B Tactical Fundamentals, US Marine Corps, Marine Corps Institute, 1984.
    • (1984) MCI 7510B Tactical Fundamentals
  • 26
    • 0343472278 scopus 로고    scopus 로고
    • Doctrine Division, Full text at US Marine Corps, MCCDC
    • Doctrine Division, MCWP 2-1 Intelligence Operations, Full text at http://www.doctrine.usmc.mil, US Marine Corps, MCCDC, 1998.
    • (1998) MCWP 2-1 Intelligence Operations
  • 31
    • 0342602245 scopus 로고    scopus 로고
    • Full text at Ohio State University, UTS Network Security Group
    • S. Romig, State of the hack, Full text at ftp://ftp.net.ohio-state.edu:/users/romig/talks/state-of-the-hack, Ohio State University, UTS Network Security Group.
    • State of the Hack
    • Romig, S.1
  • 33
    • 26444582561 scopus 로고
    • Responding to computer security incidents: Guidelines for incident handling
    • Full text at LLNL
    • E.E. Schultz et al., Responding to computer security incidents: Guidelines for incident handling, Full text at ftp://ciac.llnl.gov/pub/ciac/ciacdocs/ihg.txt, Technical report from Department of Energy, LLNL, 1990.
    • (1990) Technical Report from Department of Energy
    • Schultz, E.E.1
  • 36
    • 0343472271 scopus 로고    scopus 로고
    • Full text at Carnegie Mellon, Software Engineering Institute, Handbook CMU/SEI-98-HB-001 AA avenue of approach AO areas of operation AOI areas of interest ARNC attack repair, neutralization and containment C-IPB Cyber-IPB CD compromised device COA course of action ID intrusion detection IDS intrusion-detection system IPB intelligence preparation of the battlespace IR incident response KCD known compromised device LCD likely compromised device MO method of operations USMC US Marine Corps
    • West-Brown et al., Handbook for Computer Security Incident Response Teams (CSIRTS), Full text at http://www.sei.cmu.edu/, Carnegie Mellon, Software Engineering Institute, Handbook CMU/SEI-98-HB-001, 1998 AA avenue of approach AO areas of operation AOI areas of interest ARNC attack repair, neutralization and containment C-IPB Cyber-IPB CD compromised device COA course of action ID intrusion detection IDS intrusion-detection system IPB intelligence preparation of the battlespace IR incident response KCD known compromised device LCD likely compromised device MO method of operations USMC US Marine Corps.
    • (1998) Handbook for Computer Security Incident Response Teams (CSIRTS)
    • West-Brown1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.