메뉴 건너뛰기




Volumn 4, Issue , 2000, Pages 2344-2349

Adaptation techniques for intrusion detection and intrusion response systems

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE ALGORITHMS; COMPUTER SYSTEMS; HIERARCHICAL SYSTEMS;

EID: 0034499251     PISSN: 08843627     EISSN: None     Source Type: Journal    
DOI: 10.1109/ICSMC.2000.884341     Document Type: Article
Times cited : (73)

References (27)
  • 1
    • 85177140792 scopus 로고    scopus 로고
    • CERT/CC Statistics for 1988 through 1998 January 2000 CERT Coordination Center http://www.cert.org/stats/cert_stats.html
    • (2000)
  • 2
    • 85177115302 scopus 로고    scopus 로고
    • CERT Coordination Center 1998 January 2000 CERT Coordination Center http://www.cert.org/ annual_rpts/cert_rpt_98.html
    • (2000)
  • 3
    • 85177141055 scopus 로고    scopus 로고
    • Results of the Distributed-Systems Intruder Tools Workshop June 2000 CERT Coordination Center http://www.cert.org/reports/dsit_workshopfinal.html
    • (2000)
  • 4
    • 85177104860 scopus 로고    scopus 로고
    • M. Sobirey The Intrusion Detection System AID http://wwwrnks.informatik.tu-cottbus.de/~sobirey/aid.e.html
    • Sobirey, M.1
  • 5
    • 0003964874 scopus 로고
    • Next Generation Intrusion Detection Expert System (NIDES): A Summary
    • CA, Menlo Park
    • D. Anderson T. Frivold A. Valdes Next Generation Intrusion Detection Expert System (NIDES): A Summary May 1995 CA, Menlo Park SRI-CSL-95-07 SRI International
    • (1995)
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 6
    • 0041189147 scopus 로고    scopus 로고
    • Data Mining Approaches for Intrusion Detection
    • TX
    • W. Lee S. J. Stolfo Data Mining Approaches for Intrusion Detection Proceedings of the Proceedings of the 7th USENIX Security Symposium 79 94 Proceedings of the Proceedings of the 7th USENIX Security Symposium San Antonio TX 1998-January-26-29
    • (1998) , pp. 79-94
    • Lee, W.1    Stolfo, S.J.2
  • 8
    • 0000231655 scopus 로고    scopus 로고
    • Artificial Neural Networks for Misuse Detection
    • Virginia
    • J. Cannady Artificial Neural Networks for Misuse Detection Proceedings of the 21st National Information Systems Security Conference 441 454 Proceedings of the 21st National Information Systems Security Conference Crystal City Virginia 1998-October-6-9
    • (1998) , pp. 441-454
    • Cannady, J.1
  • 10
    • 27244453070 scopus 로고    scopus 로고
    • GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis
    • L. Mé GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection Louvain-la-Neuve Belgium 1998-September-14-16 http://www.zurich.ibm.com/~dac/Prog_RAID98/F ull_Papers/gassata_paper.ps
    • (1998)
    • Mé, L.1
  • 11
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
    • TX
    • C. Cowan C. Pu D. Maier H. Hinton P. Bakke S. Beattie A. Grier P. Wagle Q. Zhang StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks Proceedings of the 7th USENIX Security Conference Proceedings of the 7th USENIX Security Conference San Antonio TX 1998-January http://www.acsac.org/1999/papers/fri-b-1030-hinton.pdf
    • (1998)
    • Cowan, C.1    Pu, C.2    Maier, D.3    Hinton, H.4    Bakke, P.5    Beattie, S.6    Grier, A.7    Wagle, P.8    Zhang, Q.9
  • 12
    • 84904154606 scopus 로고    scopus 로고
    • SAM: Security Adaptation Manager
    • AZ
    • H. Hinton C. Cowan L. Delcambre S. Bowers SAM: Security Adaptation Manager Proceedings of the Annual Computer Security Applications Conference Proceedings of the Annual Computer Security Applications Conference Phoenix AZ 1999-December http://www.cse.ogi.edu/DISC/projects/immunix/sa m.ps.gz
    • (1999)
    • Hinton, H.1    Cowan, C.2    Delcambre, L.3    Bowers, S.4
  • 13
    • 0003750241 scopus 로고    scopus 로고
    • An Architecture for Intrusion Detection using Autonomous Agents
    • IN, West Lafayette
    • J. Balasubramaniyan J. O. Garcia-Fernandez D. Isacoff E. H. Spafford D. M. Zamboni An Architecture for Intrusion Detection using Autonomous Agents May 1998 IN, West Lafayette 98-05 COAST Laboratory, Department of Computer Science, Purdue University
    • (1998)
    • Balasubramaniyan, J.1    Garcia-Fernandez, J.O.2    Isacoff, D.3    Spafford, E.H.4    Zamboni, D.M.5
  • 14
    • 0038458235 scopus 로고
    • Active Defense of a Computer System using Autonomous Agents
    • IN, West Lafayette
    • M. Crosbie E. H. Spafford Active Defense of a Computer System using Autonomous Agents February 1995 IN, West Lafayette 95-008 COAST Laboratory, Department of Computer Science, Purdue University
    • (1995)
    • Crosbie, M.1    Spafford, E.H.2
  • 15
    • 85177116896 scopus 로고    scopus 로고
    • Intrusion Detection Intercomponent Adaptive Negotiation
    • Indiana
    • R. Feiertag L. Benzinger S. Rho S. Wu K. Levitt D. Peticolas M. Heckman S. Staniford-Chen C. Zhang Intrusion Detection Intercomponent Adaptive Negotiation Proceedings of the RAID 99: Recent Advances in Intrusion Detection Proceedings of the RAID 99: Recent Advances in Intrusion Detection West Lafayette USA Indiana 1999-September-7-9 http://seclab.cs.ucdavis.edu/papers/tis99.pdf
    • (1999)
    • Feiertag, R.1    Benzinger, L.2    Rho, S.3    Wu, S.4    Levitt, K.5    Peticolas, D.6    Heckman, M.7    Staniford-Chen, S.8    Zhang, C.9
  • 17
    • 85177140379 scopus 로고    scopus 로고
    • Market Engineering Marketing Strategy Award June 2000 Staff, Internet Security Systems, Inc. http://www.iss.net/cgi-bin/dbtdisplay.exe/db_data/press_rel/release/062800264.p It
    • (2000)
  • 18
    • 85177128282 scopus 로고    scopus 로고
    • Texas A&M University TX, College Station
    • E. A. Fisch Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior 1996 Texas A&M University TX, College Station
    • (1996)
    • Fisch, E.A.1
  • 19
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating Security Managers: A Peerbased Intrusion Detection System
    • G. B. White E. A. Fisch U. W. Pooch Cooperating Security Managers: A Peerbased Intrusion Detection System IEEE Network 10 1 20 23 January/February 1996
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3
  • 20
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
    • MD
    • P. A. Porras P. G. Neumann EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances Proceedings of the Proceedings of the 20th National Information Systems Security Conference 353 365 Proceedings of the Proceedings of the 20th National Information Systems Security Conference Baltimore MD 1997-October-7-10
    • (1997) , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 21
    • 0002804477 scopus 로고    scopus 로고
    • Experience with EMERALD to Date
    • CA
    • P. G. Neumann P. A. Porras Experience with EMERALD to Date Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring Santa Clara CA 1999-April-11-12 http://www.sage.usenix.org/publications/library/pr oceedings/detection99/neumann/neumann.pdf
    • (1999)
    • Neumann, P.G.1    Porras, P.A.2
  • 22
    • 85177109427 scopus 로고    scopus 로고
    • M. Travers Programming with Agents: New Metaphors for Thinking about Computation 1996
    • (1996)
    • Travers, M.1
  • 24
    • 0002248655 scopus 로고
    • KQML as an Agent Communication Language
    • Maryland
    • T. Finin R. Fritzson D. McKay R. McEntire KQML as an Agent Communication Language Proceedings of the Third International Conference on Information and Knowledge Management 456 463 Proceedings of the Third International Conference on Information and Knowledge Management Gaithersburg Maryland 1994
    • (1994) , pp. 456-463
    • Finin, T.1    Fritzson, R.2    McKay, D.3    McEntire, R.4
  • 26
    • 0345477912 scopus 로고    scopus 로고
    • A Methodology for using Intelligent Agents to provide Automated Intrusion Response
    • NY
    • C. A. Carver J. M. D. Hill J. R. Surdu U. W. Pooch A Methodology for using Intelligent Agents to provide Automated Intrusion Response Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop 2000 Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop West Point NY 2000-June-6-7
    • (2000) , pp. 2000
    • Carver, C.A.1    Hill, J.M.D.2    Surdu, J.R.3    Pooch, U.W.4
  • 27
    • 85177131469 scopus 로고    scopus 로고
    • An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response
    • NY
    • C. A. Carver U. W. Pooch An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop 2000 Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop West Point NY 2000-June-6-7
    • (2000) , pp. 2000
    • Carver, C.A.1    Pooch, U.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.