메뉴 건너뛰기




Volumn , Issue , 2004, Pages 61-70

Visualizing and identifying intrusion context from system calls trace

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY-BASED INTRUSION DETECTION (AID); FALSE ALARM RATES; INTRUSION CONTEXT IDENTIFICATION (ICI); INTRUSION DETECTION SYSTEMS (IDS);

EID: 21644441336     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P Anderson Co., Fort Washington, Pennsylvania, April
    • J. Anderson. Computer security threat monitoring and surveillance. Technical report, James P Anderson Co., Fort Washington, Pennsylvania, April 1980.
    • (1980) Technical Report
    • Anderson, J.1
  • 3
    • 2942749266 scopus 로고    scopus 로고
    • BlueBox: A policy-driven, host-Based intrusion detection system
    • May
    • S. Chad and P. Cheng. BlueBox: A Policy-Driven, Host-based Intrusion Detection System. ACM Transaction on Infomation and System Security, 6(2): 173-200, May 2003.
    • (2003) ACM Transaction on Infomation and System Security , vol.6 , Issue.2 , pp. 173-200
    • Chad, S.1    Cheng, P.2
  • 5
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • H. Debar, M. Dacier, and A. Wespi. A revised taxonomy for intrusion detection systems. Annales des Telecommunications, 55(7-8):361-378, 2000.
    • (2000) Annales des Telecommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 7
  • 8
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • K. Misch. Clustering intrusion detection alarms to support root cause analysis. ACM Transaction on Information and System Security, 6(4):443-471, 2003.
    • (2003) ACM Transaction on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Misch, K.1
  • 9
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • April
    • R. Kemmerer and G. Vigna. Intrusion detection: a brief history and overview. IEEE Computer, 35(4):supl27 - supl30, April 2002.
    • (2002) IEEE Computer , vol.35 , Issue.4
    • Kemmerer, R.1    Vigna, G.2
  • 11
    • 84885774862 scopus 로고    scopus 로고
    • A framework for contructing features and models for intrusion detection systems
    • Nov.
    • W. Lee and S. Stolfo. A framework for contructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3(4):227-261, Nov. 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 12
    • 0242456801 scopus 로고    scopus 로고
    • Learning nonstationary models of normal network traffic for detecting novel attacks
    • July 23-26
    • M. Mahoney and P. Chan. Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks. In SIGKDD 2002, July 23-26 2002.
    • (2002) SIGKDD 2002
    • Mahoney, M.1    Chan, P.2
  • 15
    • 0037252253 scopus 로고    scopus 로고
    • Determining the operational limits of an anomaly-based intrusion detector
    • Jan.
    • K. Tan and R. Maxion. Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on selected areas in communications, 21(1):96-110, Jan. 2003.
    • (2003) IEEE Journal on Selected Areas in Communications , vol.21 , Issue.1 , pp. 96-110
    • Tan, K.1    Maxion, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.