메뉴 건너뛰기




Volumn , Issue , 2004, Pages 66-74

Automatic analysis of firewall and network intrusion detection system configurations

Author keywords

Firewalls; Formal specification and analysis; Network configuration and security; Network intrusion detection

Indexed keywords

ABSTRACTING; COMPUTER NETWORKS; COSTS; DATA COMMUNICATION SYSTEMS; MATHEMATICAL MODELS; PUBLIC POLICY; SECURITY OF DATA;

EID: 20444432820     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029133.1029143     Document Type: Conference Paper
Times cited : (32)

References (21)
  • 3
    • 0022769976 scopus 로고
    • Graph-based algorithms for Boolean function manipulation
    • Aug.
    • R. E. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, Aug. 1986.
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 11
    • 20444487985 scopus 로고    scopus 로고
    • Finding and containing enemies within the walls with self-securing network interfaces
    • School of Computer Science, Carnegie-Mellon University, Jan.
    • G. R. Ganger, G. Economou, and S. M. Bielski. Finding and containing enemies within the walls with self-securing network interfaces. Technical Report CMU-CS-03-109, School of Computer Science, Carnegie-Mellon University, Jan. 2003.
    • (2003) Technical Report , vol.CMU-CS-03-109
    • Ganger, G.R.1    Economou, G.2    Bielski, S.M.3
  • 12
    • 0030644427 scopus 로고    scopus 로고
    • Filtering postures: Local enforcement for global policies
    • Oakland, California, May 1997. Extended version available as MITRE technical report
    • J. D. Guttman. Filtering postures: Local enforcement for global policies. In IEEE Symposium on Security and Privacy, pages 120-129, Oakland, California, May 1997. Extended version available as MITRE technical report, 1997.
    • (1997) IEEE Symposium on Security and Privacy , pp. 120-129
    • Guttman, J.D.1
  • 13
    • 20444500759 scopus 로고    scopus 로고
    • Rigorous automated network security management
    • Technical report, MITRE Corp., Aug. Preliminary version appeared
    • J. D. Guttman and A. L. Herzog. Rigorous automated network security management. Technical report, MITRE Corp., Aug. 2003. Preliminary version appeared in Proc. VERIFY 2002.
    • (2003) Proc. VERIFY 2002
    • Guttman, J.D.1    Herzog, A.L.2
  • 18
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc., Jan.
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., Jan. 1998.
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 19
    • 1642293015 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • Nov.
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In USENIX LISA '99, Nov. 1999. www.snort.org.
    • (1999) USENIX LISA '99
    • Roesch, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.