메뉴 건너뛰기




Volumn , Issue , 2001, Pages 89-96

NATE - Network analysis of anomalous traffic events, a low-cost approach

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; SECURITY SYSTEMS; SYSTEMS ANALYSIS;

EID: 0242456143     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (71)

References (23)
  • 1
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice intrusion detection technologies
    • Carnegie Mellon, SEI, Tech Report, CMU/SEI-99-TR-028, ESC-99-028, January
    • J. Allen et al. State of the practice intrusion detection technologies. Carnegie Mellon, SEI, Tech Report, CMU/SEI-99-TR-028, ESC-99-028, January 2000.
    • (2000)
    • Allen, J.1
  • 4
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S.A., S. Forrest. Architecture for an artificial immune system. Evolutionary Computation, 7(1):45-68, 1999.
    • (1999) Evolutionary Computation , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.A.1    Forrest, S.2
  • 5
    • 0242444853 scopus 로고    scopus 로고
    • LBNL, University of California, June
    • V. Jacobson, C. Leres, and S. McCanne. tcpdump. LBNL, University of California, June 1997, ftp://ftp.ee.lbl.gov/tcpdump.tar.Z.
    • (1997) Tcpdump
    • Jacobson, V.1    Leres, C.2    McCanne, S.3
  • 6
    • 0004118981 scopus 로고
    • The NIDES statistical component: Description and justification
    • Tech. Report, Computer Science Lab., SRI-Int., Menlo Park, CA, March
    • H. S. Javitz, and A. Valdes. The NIDES statistical component: description and justification. Tech. Report, Computer Science Lab., SRI-Int., Menlo Park, CA, March 1994.
    • (1994)
    • Javitz, H.S.1    Valdes, A.2
  • 9
    • 0004204715 scopus 로고    scopus 로고
    • A database of computer attacks for the evaluation of intrusion detection systems
    • Masters Thesis, MIT, June
    • K. Kendell. A database of computer attacks for the evaluation of intrusion detection systems. Masters Thesis, MIT, June 1999
    • (1999)
    • Kendell, K.1
  • 10
    • 4243333791 scopus 로고    scopus 로고
    • Intrusion detection technical evaluation - 1998 project summary
    • R. Lippmann and M. Zissman. Intrusion detection technical evaluation - 1998 project summary. www.darpa.mit/ito.
    • Lippmann, R.1    Zissman, M.2
  • 12
    • 0242528402 scopus 로고    scopus 로고
    • Naval Surface Warfare Center Dahlgren Lab.
    • S. Northcutt, V. Irwin, B. Ralph. Shadow. Naval Surface Warfare Center Dahlgren Lab., 1998.
    • (1998) Shadow
    • Northcutt, S.1    Irwin, V.2    Ralph, B.3
  • 15
    • 0012977967 scopus 로고    scopus 로고
    • Snort - Lightweight intrusions detection for networks
    • M. Roesch. Snort - lightweight intrusions detection for networks. www.clark.net/~roesch/security.html.
    • Roesch, M.1
  • 16
    • 84874489776 scopus 로고    scopus 로고
    • Cautionary tales: Stealth coordinated attack howto
    • D. Ruiu. Cautionary tales: stealth coordinated attack howto.www.nswc.navy.mil/ISSEC/CID/Stealth_Coordinated_Attack.html. 1999.
    • (1999)
    • Ruiu, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.