메뉴 건너뛰기




Volumn , Issue , 2002, Pages 329-344

Integrating intrusion detection and network management

Author keywords

Anomaly Detection; Distributed Denial of Service Attacks; Intrusion Detection; Intrusion Detection Agent; MIB II; Network Security Management

Indexed keywords

COMPUTER NETWORKS; COMPUTER SYSTEM FIREWALLS; CRYPTOGRAPHY; INFORMATION MANAGEMENT; SECURITY OF DATA;

EID: 0038048503     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (23)
  • 1
    • 0038755581 scopus 로고    scopus 로고
    • Intrusion detection: An introduction to Internet surveillance, correlation, traps, trace back, and response
    • E. Amoroso. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response. Intrusion.Net Books, 1999.
    • (1999) Intrusion.Net Books
    • Amoroso, E.1
  • 2
    • 0003964874 scopus 로고
    • Next-generation intrusion de-tection expert system (NIDES): A summary
    • Computer Science Laboratory, SRI International, Menlo Park, California, May
    • D. Anderson, T. Frivold, and A. Valdes. Next-generation intrusion de-tection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
    • (1995) Technical Report SRI-CSL-95-07
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 3
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P. Anderson Company, Fort Washington, Pennsylvania, April
    • J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 4
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing
    • R. Bace. Intrusion Detection. Macmillan Technical Publishing, 2000.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 9
    • 0008723266 scopus 로고    scopus 로고
    • Distributed denial of service - Trin00, tribe flood network, tribe flood network 2000, and stacheldraht
    • Department of Energy - CIAC (Computer Incident Advisory Capability), February
    • P.J. Criscuolo. Distributed denial of service - trin00, tribe flood network, tribe flood network 2000, and stacheldraht. Technical Report CIAC-2319, Department of Energy - CIAC (Computer Incident Advisory Capability), February 2000.
    • (2000) Technical Report CIAC-2319 , vol.CIAC-2319
    • Criscuolo, P.J.1
  • 14
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 18
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore MD, October
    • P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In National Information Systems Security Conference, Baltimore MD, October 1997.
    • (1997) National Information Systems Security Conference
    • Porras, P.A.1    Neumann, P.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.