메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages 1503-1508

Towards the scalable implementation of a user level anomaly detection system

Author keywords

Anomaly detection; Scalability; User level detection

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; FAULT TOLERANT COMPUTER SYSTEMS; MATHEMATICAL MODELS; SECURITY SYSTEMS;

EID: 0037001741     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (31)
  • 1
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion detection systems
    • Elsevier
    • H. Debar, M. Dacier and A. Wespie "Towards a Taxonomy of Intrusion Detection Systems", Computer Networks, Elsevier, Vol. 31, 1999, pp. 805-822.
    • (1999) Computer Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespie, A.3
  • 5
    • 84873309550 scopus 로고
    • Penetration state transition analysis - A rule-based intrusion detection approach
    • IEEE Computer Society Press, November 30-December 4
    • P. A. Porras and R. A. Kemmerer, "Penetration State Transition Analysis - A Rule-Based Intrusion Detection Approach", Eight Annual Computer Security Applications Conference, IEEE Computer Society Press, November 30-December 4 1992, pp.220-229.
    • (1992) Eight Annual Computer Security Applications Conference , pp. 220-229
    • Porras, P.A.1    Kemmerer, R.A.2
  • 11
    • 0003690982 scopus 로고
    • System design document: Next generation intrusion detection expert system (NIDES). Technical report A007/A008/A009/A011/A012/A014
    • SRI International, March
    • R. Jagannathan, T. Lunt, D. Anderson, C. Dodd, F. Gilham, C. Jalali, H. Javitz, P. Neumann, A. Tamaru and A. Valdez, "System Design Document: Next Generation Intrusion Detection Expert System (NIDES). Technical Report A007/A008/A009/A011/A012/A014", SRI International, March 1993.
    • (1993)
    • Jagannathan, R.1    Lunt, T.2    Anderson, D.3    Dodd, C.4    Gilham, F.5    Jalali, C.6    Javitz, H.7    Neumann, P.8    Tamaru, A.9    Valdez, A.10
  • 15
    • 0013439651 scopus 로고    scopus 로고
    • Intrusion modeling: Approximating computer user intentions for detection and predictions of intrustions
    • May
    • T. Spyrou and J. Darzentas, "Intrusion Modeling: Approximating Computer User Intentions for Detection and Predictions of Intrustions", Information Systems Security, May 1996, pp. 319-335.
    • (1996) Information Systems Security , pp. 319-335
    • Spyrou, T.1    Darzentas, J.2
  • 17
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • T. Lane and C. E. Brodley, "Temporal Sequence Learning and Data Reduction For Anomaly Detection", ACM Transactions on Information and System Security, 2(3), 1999, pp. 295-331.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 23
    • 0013447240 scopus 로고    scopus 로고
    • Robert Nation et. al, http://www.fvwm.org.
    • Nation, R.1
  • 24
    • 0013454142 scopus 로고    scopus 로고
    • The Open Group
    • The Open Group, http://www.opengroup.org/cde.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.