메뉴 건너뛰기




Volumn 22, Issue 7, 2003, Pages 613-623

Detecting intrusion with rule-based integration of multiple models

Author keywords

Anomaly detection; Intrusion detection systems; Multi measure modeling

Indexed keywords

COMPUTER CRIME; DATA MINING; ERROR ANALYSIS; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; STATISTICAL METHODS;

EID: 0242637092     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(03)00711-9     Document Type: Note
Times cited : (43)

References (22)
  • 3
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Department of Computer Engineering, Chalmers University, March
    • S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
    • (2000) Technical Report , vol.99 , Issue.15
    • Axelsson, S.1
  • 4
    • 0035665469 scopus 로고    scopus 로고
    • A comparison of intrusion detection systems
    • December
    • E. Biermann, E. Cloete and L. M. Venter, "A comparison of intrusion detection systems," Computers & Security, vol 20, no. 8, pp. 676-683, December 2001.
    • (2001) Computers & Security , vol.20 , Issue.8 , pp. 676-683
    • Biermann, E.1    Cloete, E.2    Venter, L.M.3
  • 6
    • 0003451777 scopus 로고
    • A real-time intrusion-detection expert system (IDES)
    • CSL, SRI International, Computer Science Laboratory, SRI International, February
    • T.F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalali, and P.G. Neuman, "A real-time intrusion-detection expert system (IDES)," Technical Report Project 6784, CSL, SRI International, Computer Science Laboratory, SRI International, February 1992.
    • (1992) Technical Report Project , vol.6784
    • Lunt, T.F.1    Tamaru, A.2    Gilham, F.3    Jagannathan, R.4    Jalali, C.5    Neuman, P.G.6
  • 7
    • 0242667960 scopus 로고
    • Detecting unusual program behavior using the statistical components of NIDES
    • SRI International, May
    • D. Anderson, T.F. Lunt, H. Javits, A. Tamaru and A. Valdes, "Detecting unusual program behavior using the statistical components of NIDES," NIDES Technical Report, SRI International, May 1995.
    • (1995) NIDES Technical Report
    • Anderson, D.1    Lunt, T.F.2    Javits, H.3    Tamaru, A.4    Valdes, A.5
  • 11
    • 0037282635 scopus 로고    scopus 로고
    • Efficient anomaly detection by modeling privilege flows with hidden Markov model
    • S.-B. Cho and H.-J. Park, "Efficient anomaly detection by modeling privilege flows with hidden Markov model," Computers & Security, vol. 22, no. 1, pp. 45-55, 2003.
    • (2003) Computers & Security , vol.22 , Issue.1 , pp. 45-55
    • Cho, S.-B.1    Park, H.-J.2
  • 12
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • R. Lippmann and S. Cunningham, "improving intrusion detection performance using keyword selection and neural networks," Computer Networks, vol. 34, no. 4, pp. 594-603, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 594-603
    • Lippmann, R.1    Cunningham, S.2
  • 16
    • 0036588773 scopus 로고    scopus 로고
    • Incorporating soft computing techniques into a probabilistic intrusion detection system
    • May
    • S.-B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. on Systems, Man and Cybernetics-Part C:Applications and Reviews, vol. 32, no. 2, pp. 154-160, May 2002.
    • (2002) IEEE Trans. on Systems, Man and Cybernetics-Part C:Applications and Reviews , vol.32 , Issue.2 , pp. 154-160
    • Cho, S.-B.1
  • 17
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L.R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 18
    • 0022594196 scopus 로고
    • An introduction to hidden Markov models
    • January
    • L.R. Rabiner and B.H. Juang, "An introduction to hidden Markov models," IEEE ASSP Magazine, pp. 4-16, January 1986.
    • (1986) IEEE ASSP Magazine , pp. 4-16
    • Rabiner, L.R.1    Juang, B.H.2
  • 19
    • 0003231931 scopus 로고
    • The SRI IDES statistical anomaly detector
    • SRI International
    • H.S. Javitz and A. Valdes, "The SRI IDES statistical anomaly detector," NIDES Technical Report, SRI International, 1991.
    • (1991) NIDES Technical Report
    • Javitz, H.S.1    Valdes, A.2
  • 20
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Mitre Corporation, March
    • D.E. Bell and L.J. LaPadula, "Secure computer systems: Unified exposition and multics interpretation," Mitre Technical Report ESD-TR-75-306, Mitre Corporation, March 1976.
    • (1976) Mitre Technical Report , vol.ESD-TR-75-306
    • Bell, D.E.1    Lapadula, L.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.