메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages 1402-1407

Control and estimation methods in information assurance - A tutorial on intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

CONGESTION CONTROL (COMMUNICATION); ESTIMATION; FEEDBACK; INFORMATION SCIENCE; MANAGEMENT INFORMATION SYSTEMS; PROBABILITY;

EID: 0036994338     PISSN: 01912216     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (41)
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • Technical Report CMU/SEI-99-TR-028, Carnegie Mellon University - Software Engineering Institute, January
    • J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99-TR-028, Carnegie Mellon University - Software Engineering Institute, January 2000.
    • (2000)
    • Allen, J.1    Christie, A.2    Fithen, W.3    McHugh, J.4    Pickel, J.5    Stoner, E.6
  • 3
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • Technical report, James P. Anderson Co.; Contract No. 79F26400
    • J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., 1980. Contract No. 79F26400.
    • (1980)
    • Anderson, J.P.1
  • 5
    • 0003524305 scopus 로고    scopus 로고
    • A preliminary attempt to apply detection and estimation theory to intrusion detection
    • Technical Report 00-4, Department of Computer Engineering - Chalmers University of Technology, Sweden, March
    • S. Axelsson. A Preliminary Attempt to Apply Detection and Estimation Theory to Intrusion Detection. Technical Report 00-4, Department of Computer Engineering - Chalmers University of Technology, Sweden, March 2000.
    • (2000)
    • Axelsson, S.1
  • 6
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A taxonomy and survey
    • Technical Report 99-15, Department of Computer Engineering - Chalmers University of Technology, Sweden, March
    • S. Axelsson. Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99-15, Department of Computer Engineering - Chalmers University of Technology, Sweden, March 2000.
    • (2000)
    • Axelsson, S.1
  • 9
    • 0013264090 scopus 로고    scopus 로고
    • Proactive intrusion detection and distributed denial of service attacks - A case study in security management
    • June
    • J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, and R. K. Mehra. Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. Journal of Network and Systems Management, 10(2):225-254, June 2002.
    • (2002) Journal of Network and Systems Management , vol.10 , Issue.2 , pp. 225-254
    • Cabrera, J.B.D.1    Lewis, L.2    Qin, X.3    Lee, W.4    Mehra, R.K.5
  • 13
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi. Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks, 31:805-822, 1999.
    • (1999) Computer Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 19
    • 0004204715 scopus 로고    scopus 로고
    • A database of computer attacks for the evaluation of intrusion detection systems
    • Master's thesis, Massachusetts Institute of Technology, June
    • K. Kendall. A database of computer attacks for the evaluation of intrusion detection systems. Master's thesis, Massachusetts Institute of Technology, June 1999.
    • (1999)
    • Kendall, K.1
  • 20
    • 0034588633 scopus 로고    scopus 로고
    • On the trail of intrusions into information systems
    • December
    • S. Kent. On the trail of intrusions into information systems. IEEE Spectrum, pages 52-56, December 2000.
    • (2000) IEEE Spectrum , pp. 52-56
    • Kent, S.1
  • 24
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • November
    • W. Lee and S. J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and Systems, 3(4), November 2000.
    • (2000) ACM Transactions on Information and Systems , vol.3 , Issue.4
    • Lee, W.1    Stolfo, S.J.2
  • 33
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31:2435-2463, December 1999.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 37
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 39
    • 0003714340 scopus 로고    scopus 로고
    • F. B. Schneider, editor; National Academy Press
    • F. B. Schneider, editor. Trust in Cyberspace. National Academy Press, 1998.
    • (1998) Trust in Cyberspace
  • 40
    • 2942751146 scopus 로고    scopus 로고
    • Experiences with specification-based intrusion detection
    • Springer-Verlag, Lecture Notes in Computer Science, Number 2212
    • P. Uppuluri and R. Sekar. Experiences with Specification-based Intrusion Detection. In Recent Advances in Intrusion Detection (RAID 2001). Springer-Verlag, Lecture Notes in Computer Science, Number 2212, 2001.
    • (2001) Recent Advances in Intrusion Detection (RAID 2001)
    • Uppuluri, P.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.