메뉴 건너뛰기




Volumn 23, Issue 1, 2004, Pages 31-42

Mitigation of network tampering using dynamic dispatch of mobile agents

Author keywords

File integrity analyzers; Host based security with network components; Insider risks; Mobile agent behaviours; Tampering modes

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; ELECTRONIC CRIME COUNTERMEASURES; SOFTWARE AGENTS;

EID: 1242263788     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(04)00068-9     Document Type: Article
Times cited : (16)

References (38)
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans Inform Syst Secur (TISSEC). 3:(3):2000;186-205.
    • (2000) ACM Trans Inform Syst Secur (TISSEC) , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 8
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • Debar H., Dacier M., Wespi A. Towards a taxonomy of intrusion-detection systems. Comput Netw. 31:1999;805-822.
    • (1999) Comput Netw , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 9
    • 25744463368 scopus 로고    scopus 로고
    • Confidant operational concept
    • School of Electrical Engineering and Computer Science, University of Central Florida
    • DeMara RF, Rocke AJ. Confidant operational concept. Tech. Rep. TR-RFD2003-02, School of Electrical Engineering and Computer Science, University of Central Florida; 2003.
    • (2003) Tech. Rep. , vol.TR-RFD2003-02
    • DeMara, R.F.1    Rocke, A.J.2
  • 13
    • 84902478861 scopus 로고    scopus 로고
    • Policy meditation for multi-enterprise environments
    • Computer Security Applications Conference, 1999
    • Galiasso P., Bremer O., Hale J., Shenoi S., Ferraiolo D., Hu V. Policy meditation for multi-enterprise environments. Computer Security Applications Conference, 1999. (ACSAC '99) Proceedings. 1999;219-228.
    • (1999) (ACSAC '99) Proceedings , pp. 219-228
    • Galiasso, P.1    Bremer, O.2    Hale, J.3    Shenoi, S.4    Ferraiolo, D.5    Hu, V.6
  • 17
    • 0003615205 scopus 로고    scopus 로고
    • A common language for computer security incidents
    • Sandia National Laboratories; October
    • Howard JD, Longstaff TA. A common language for computer security incidents. Sandia report SAND98-8667, Sandia National Laboratories; October 1998.
    • (1998) Sandia Report , vol.SAND98-8667
    • Howard, J.D.1    Longstaff, T.A.2
  • 18
    • 1242273297 scopus 로고    scopus 로고
    • IBM Research. Aglets. http://www.trl.ibm.com/aglets.
    • Aglets
  • 20
    • 33745631135 scopus 로고    scopus 로고
    • Tolerating penetrations and insider attacks by requiring independent corroboration
    • ACM Press
    • Kahn C. Tolerating penetrations and insider attacks by requiring independent corroboration. Proceedings of the 1998 Workshop on New Security Paradigms. 1998;122-133 ACM Press.
    • (1998) Proceedings of the 1998 Workshop on New Security Paradigms , pp. 122-133
    • Kahn, C.1
  • 22
    • 0012624241 scopus 로고
    • Experiences with tripwire: Using integrity checkers for intrusion detection
    • Department of Computer Sciences, Purdue University
    • Kim GH, Spafford EH. Experiences with tripwire: using integrity checkers for intrusion detection. Tech. Rep. CSD-TR-94-012, Department of Computer Sciences, Purdue University; 1994.
    • (1994) Tech. Rep. , vol.CSD-TR-94-012
    • Kim, G.H.1    Spafford, E.H.2
  • 24
    • 0042282155 scopus 로고    scopus 로고
    • Security in mobile agent system: Problems and approaches
    • Kun Y., Xin G., Dayou L. Security in mobile agent system: problems and approaches. ACM SIGOPS Operating Syst Rev. 34:(1):2000;21-28.
    • (2000) ACM SIGOPS Operating Syst Rev , vol.34 , Issue.1 , pp. 21-28
    • Kun, Y.1    Xin, G.2    Dayou, L.3
  • 26
    • 1242295753 scopus 로고    scopus 로고
    • Linden T. Nabou. http://www.nabou.org/en/software/nabou/.
    • Nabou
    • Linden, T.1
  • 34
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • Spafford E.H., Zamboni D. Intrusion detection using autonomous agents. Comput Netw. 34:(4):2000;547-570.
    • (2000) Comput Netw , vol.34 , Issue.4 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 36
    • 84905650218 scopus 로고    scopus 로고
    • WetStone Technologies, Inc. SMART Watch. http://www.wetstonetech.com/smartwatch_ns.html.
    • SMART Watch
  • 37
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer-based intrusion detection system
    • White G.B., Fisch E.A., Pooch U.W. Cooperating security managers: a peer-based intrusion detection system. IEEE Netw. 1996;20-23.
    • (1996) IEEE Netw , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.