메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 171-176

IDS vulnerability analysis using Genertia red teams

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; INTERACTIVE COMPUTER SYSTEMS; LEARNING SYSTEMS;

EID: 1642333153     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (24)
  • 2
    • 0345389037 scopus 로고    scopus 로고
    • Data mining for network intrusion detection: How to get started
    • The MITRE Corporation, August 2001
    • Bloedorn, E., Christiansen, A. D., Hill, W., Skorupka C., Talbot, L. M., and Tivel, J. (2001). "Data Mining for Network Intrusion Detection: How to Get Started", available at: www.mitre.org/support/papers/archive01.shtml, The MITRE Corporation, August 2001.
    • (2001)
    • Bloedorn, E.1    Christiansen, A.D.2    Hill, W.3    Skorupka, C.4    Talbot, L.M.5    Tivel, J.6
  • 5
    • 0002511642 scopus 로고    scopus 로고
    • An overview of artificial immune systems and their applications
    • D. Dasgupta, ed.; Springer
    • Dasgupta, D. (1999). "An Overview of Artificial Immune Systems and Their Applications", Artificial Immune Systems and Their Applications, D. Dasgupta, ed., pp. 3-21, Springer.
    • (1999) Artificial Immune Systems and Their Applications , pp. 3-21
    • Dasgupta, D.1
  • 6
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • IEEE Press
    • Dasgupta, D. and Gonzalez, F. (2002)., "An Immunity-Based Technique to Characterize Intrusions in Computer Networks", IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, pp. 281-291. IEEE Press.
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1    Gonzalez, F.2
  • 9
    • 0002819121 scopus 로고
    • A comparative analysis of selection schemes used in genetic algorithms
    • Gregory J. E. Rawlins, ed.; Morgan Kaufmann Publishers
    • Goldberg, D. E. and Deb, K. (1989). "A Comparative Analysis of Selection Schemes Used in Genetic Algorithms", Foundations of Genetic Algorithms (1989), Gregory J. E. Rawlins, ed., pp. 69-93, Morgan Kaufmann Publishers.
    • (1989) Foundations of Genetic Algorithms (1989) , pp. 69-93
    • Goldberg, D.E.1    Deb, K.2
  • 10
    • 0003496659 scopus 로고    scopus 로고
    • An immunological model of distributed detection and its application to computer security
    • Ph.D. Dissertation, Department of Computer Science, The University of New Mexico
    • Hofmeyr, S. (1999). An Immunological Model of Distributed Detection and Its Application to Computer Security, Ph.D. Dissertation, Department of Computer Science, The University of New Mexico.
    • (1999)
    • Hofmeyr, S.1
  • 12
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S., and Forrest, S. (1999). "Architecture for an Artificial Immune System", Evolutionary Computation, 7(1):45-68.
    • (1999) Evolutionary Computation , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.1    Forrest, S.2
  • 14
    • 1642271996 scopus 로고    scopus 로고
    • Artificial immunity for computer network with constraint-based detector
    • Masters Thesis, Department of Computer Science and Software Engineering, Auburn University
    • Hou, H. (2002). Artificial Immunity for Computer Network with Constraint-Based Detector, Masters Thesis, Department of Computer Science and Software Engineering, Auburn University.
    • (2002)
    • Hou, H.1
  • 22
    • 1642336944 scopus 로고    scopus 로고
    • Distributed metastasis: A computer network penetration methodology
    • Stewart, A. J. (1999). "Distributed Metastasis: A Computer Network Penetration Methodology", available at: citeseer.nj.nec.com/387640.html.
    • (1999)
    • Stewart, A.J.1
  • 24
    • 1642309366 scopus 로고    scopus 로고
    • Use of an immune model to improve intrusion detection on dynamic broadcast local area networks
    • Masters Thesis, Department of Computer Science & Software Engineering, Auburn University
    • Zhu, J. (2002). Use of an Immune Model to Improve Intrusion Detection on Dynamic Broadcast Local Area Networks, Masters Thesis, Department of Computer Science & Software Engineering, Auburn University.
    • (2002)
    • Zhu, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.