메뉴 건너뛰기




Volumn 21, Issue 1, 2003, Pages 96-110

Determining the operational limits of an anomaly-based intrusion detector

Author keywords

Anomaly; Anomaly detection; Evaluation; Intrusion detection; Stide

Indexed keywords

ALGORITHMS; COMPUTER VIRUSES; PROBABILITY; UNIX;

EID: 0037252253     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2002.806130     Document Type: Article
Times cited : (48)

References (13)
  • 4
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) J. Comput. Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 10
    • 0002675748 scopus 로고    scopus 로고
    • Intrusion detection for distributed applications
    • July
    • M. Stillerman, C. Marceau, and M. Stillman, "Intrusion detection for distributed applications," Commun. ACM, vol. 42, no. 7, pp. 62-69, July 1999.
    • (1999) Commun. ACM , vol.42 , Issue.7 , pp. 62-69
    • Stillerman, M.1    Marceau, C.2    Stillman, M.3
  • 11
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • in Lectures Notes in Computer Science, A. Wespi, G Vigna, and L Deri, Eds. Berlin, Germany: Springer-Verlag
    • K. M. C. Tan, K. S. Killourhy, and R. A. Maxion, "Undermining an anomaly-based intrusion detection system using common exploits," in Lectures Notes in Computer Science, A. Wespi, G Vigna, and L Deri, Eds. Berlin, Germany: Springer-Verlag, 2002, vol. 2516, Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), pp. 54-73.
    • (2002) Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002) , vol.2516 , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 12
    • 0003444290 scopus 로고    scopus 로고
    • Computer immune systems, data sets and software: Sequence-based intrusion detection
    • Univ. New Mexico, Albuquerque. (Feb.); [Online]
    • Univ. New Mexico, Albuquerque. (Feb. 2002) Computer Immune Systems, Data Sets and Software: Sequence-Based Intrusion Detection. [Online]. Available: http://www.cs.unm.edu/~immsec/systemcalls.htm
    • (2002)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.