메뉴 건너뛰기




Volumn 34, Issue 4, 2000, Pages 579-595

1999 DARPA off-line intrusion detection evaluation

Author keywords

[No Author keywords available]

Indexed keywords

CONGESTION CONTROL (COMMUNICATION); DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; SECURITY OF DATA; SIGNAL DETECTION; TELECOMMUNICATION TRAFFIC; UNIX;

EID: 0034301517     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1389-1286(00)00139-0     Document Type: Article
Times cited : (665)

References (24)
  • 2
    • 0003482133 scopus 로고    scopus 로고
    • Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response
    • E.G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, 1999.
    • (1999) Intrusion.Net Books
    • Amoroso, E.G.1
  • 4
    • 2542563730 scopus 로고    scopus 로고
    • An experimental workbench for intrusion detection systems
    • IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, 9 March
    • H. Debar, M. Dacier, A. Wespi, S. Lampart, An experimental workbench for intrusion detection systems, Research Report RZ 2998 (#93044), IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, 9 March 1999, http://www.zurich.ibm.com/Technology/Security/extern/gsal/docs/index.html.
    • (1999) Research Report RZ 2998 (#93044)
    • Debar, H.1    Dacier, M.2    Wespi, A.3    Lampart, S.4
  • 7
    • 85084160308 scopus 로고    scopus 로고
    • A study in using neural networks for anomaly and misuse detection
    • 23-26 August Washington, DC
    • A.K. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, in: Proceedings of the USENIX Security Symposium, 23-26 August 1999, Washington, DC, http://www.rstcorp.com/simanup/.
    • (1999) Proceedings of the USENIX Security Symposium
    • Ghosh, A.K.1    Schwartzbard, A.2
  • 12
    • 0012249167 scopus 로고    scopus 로고
    • Guide to creating stealthy attacks for the 1999 DARPA off-line intrusion detection evaluation
    • June
    • R.P. Lippmann, R.K. Cunningham, Guide to creating stealthy attacks for the 1999 DARPA off-line intrusion detection evaluation, MIT Lincoln Laboratory Project Report IDDE-1, June 1999.
    • (1999) MIT Lincoln Laboratory Project Report IDDE-1
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 17
    • 3643079262 scopus 로고    scopus 로고
    • A software platform for testing intrusion detection systems
    • N. Puketza, M. Chung, R.A. Olsson, B. Mukherjee, A software platform for testing intrusion detection systems, IEEE Software (September/October 1997) 43-51.
    • (1997) IEEE Software , pp. 43-51
    • Puketza, N.1    Chung, M.2    Olsson, R.A.3    Mukherjee, B.4
  • 19
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • Washington, DC, August
    • R. Sekar, P. Uppuluri, Synthesizing fast intrusion prevention/detection systems from high-level specifications, in: Proceedings of the Eighth Usenix Security Symposium, Washington, DC, August 1999, http://rcs-sgi.cs.iastate.edu/sekar/abs/usenixsec99.htm.
    • (1999) Proceedings of the Eighth Usenix Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 20
    • 0343472303 scopus 로고    scopus 로고
    • Intrusion detection, take two
    • 15 November
    • G. Shipley, Intrusion detection, take two, Network Computing, 15 November 1999, http://www.nwc.com/1023/10231.html.
    • (1999) Network Computing
    • Shipley, G.1
  • 24
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna, R. Kemmerer, NetSTAT: A network-based intrusion detection system, Journal of Computer Security 7(1) (1999).
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.