메뉴 건너뛰기




Volumn 23, Issue 8, 2004, Pages 687-696

Modelling and solving the intrusion detection problem in computer networks

Author keywords

Anomaly intrusion detection; Audit trail analysis; Intrusion detection; Misuse intrusion detection; User behavior; Within Class Dissimilarity

Indexed keywords

ADDERS; COMPUTER APPLICATIONS; COMPUTER NETWORKS; SECURITY OF DATA; SECURITY SYSTEMS; STATISTICAL METHODS; USER INTERFACES;

EID: 10644257876     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.05.007     Document Type: Article
Times cited : (14)

References (13)
  • 1
    • 0003478316 scopus 로고
    • An architecture of a network level intrusion detection system
    • Department of Computer Science, University of New Mexico; August
    • Heady R, Luger G, Maccabe A, Servilla M. An architecture of a network level intrusion detection system. Technical report. Department of Computer Science, University of New Mexico; August 1990.
    • (1990) Technical Report
    • Heady, R.1    Luger, G.2    Maccabe, A.3    Servilla, M.4
  • 3
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Denning D. An intrusion detection model. IEEE Trans Softw Eng 1987;13(2):222-32.
    • (1987) IEEE Trans Softw Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 4
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • Ilgun K, Kemmerer RA, Porras PA. State transition analysis: a rule-based intrusion detection approach. IEEE Trans Softw Eng 1995 March;21(3):181-99.
    • (1995) IEEE Trans Softw Eng , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 5
    • 0003892692 scopus 로고
    • Master's thesis, Computer Science Department, University of California, Santa Barbara; July
    • Ilgun K. USTAT: a real-time intrusion detection system for UNIX. Master's thesis, Computer Science Department, University of California, Santa Barbara; July 1992.
    • (1992) USTAT: A Real-time Intrusion Detection System for UNIX
    • Ilgun, K.1
  • 8
    • 0003900915 scopus 로고
    • An application of pattern matching in intrusion detection
    • the COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, Indiana 47907-1398; June 17
    • Kumar S, Spafford EH. An application of pattern matching in intrusion detection. Technical report CSD-TR-94-013, the COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, Indiana 47907-1398; June 17, 1994a.
    • (1994) Technical Report , vol.CSD-TR-94-013
    • Kumar, S.1    Spafford, E.H.2
  • 9
    • 0002028280 scopus 로고
    • A pattern matching model for misuse intrusion detection
    • Baltimore MD; NIST, National Institute of Standards and Technology/National Computer Security Center
    • Kumar S, Spafford EH. A pattern matching model for misuse intrusion detection. Proceedings of the 17th National Computer Security Conference, Baltimore MD; 1994b. p. 11-21. NIST, National Institute of Standards and Technology/National Computer Security Center.
    • (1994) Proceedings of the 17th National Computer Security Conference , pp. 11-21
    • Kumar, S.1    Spafford, E.H.2
  • 10
    • 3643063987 scopus 로고
    • A software architecture to support misuse intrusion detection
    • the COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, Indiana 47907-1398; March 17th
    • Kumar S, Spafford EH. A software architecture to support misuse intrusion detection. Technical report CSD-TR-95-009, the COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, Indiana 47907-1398; March 17th 1995.
    • (1995) Technical Report , vol.CSD-TR-95-009
    • Kumar, S.1    Spafford, E.H.2
  • 13
    • 10644268907 scopus 로고
    • Un algorithme génétique pour détecter des intrusions dans un systéme informatique
    • Mé L. Un algorithme génétique pour détecter des intrusions dans un systéme informatique. VALGO 1995;95(1): 68-78.
    • (1995) VALGO , vol.95 , Issue.1 , pp. 68-78
    • Mé, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.