메뉴 건너뛰기




Volumn , Issue , 2004, Pages 189-202

RACOON: Rapidly generating user command data for anomaly detection from customizable templates

Author keywords

[No Author keywords available]

Indexed keywords

DATA AVAILABILITY; NETWORK AUDIT; RACOON; USER COMMAND DATA;

EID: 21644478785     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (26)
  • 2
    • 2542563730 scopus 로고    scopus 로고
    • An experimentation workbench for intrusion detection systems
    • IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland
    • H. Debar, M. Dacier, A. Wespi, and S. Lampart. An experimentation workbench for intrusion detection systems. Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland, 1998.
    • (1998) Technical Report , vol.RZ2998
    • Debar, H.1    Dacier, M.2    Wespi, A.3    Lampart, S.4
  • 6
    • 0013420742 scopus 로고
    • Using unix: Collected traces of 168 users
    • Department of Computer Science, University of Calgary, Calgary, Canada
    • S. Greenberg. Using Unix: Collected Traces of 168 Users. Technical Report 88/333/45, Department of Computer Science, University of Calgary, Calgary, Canada, 1988.
    • (1988) Technical Report 88/333/45
    • Greenberg, S.1
  • 8
    • 21644470792 scopus 로고    scopus 로고
    • T. Lane. Purdue UNIX User Data. http://www.cs.unm.edu/terran/research/data/Purdue_UNIX_user_data.tar.gz, 1999.
    • (1999) Purdue UNIX User Data
    • Lane, T.1
  • 9
    • 0003027845 scopus 로고    scopus 로고
    • An application of machine learning to anomaly detection
    • Gaithersburg, MD, The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology
    • T. Lane and C. E. Brodley. An application of machine learning to anomaly detection. In Proceedings of the Twentieth National Information Systems Security Conference, volume 1, pages 366-380, Gaithersburg, MD, 1997. The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology.
    • (1997) Proceedings of the Twentieth National Information Systems Security Conference , vol.1 , pp. 366-380
    • Lane, T.1    Brodley, C.E.2
  • 11
    • 21644484977 scopus 로고    scopus 로고
    • An empirical study of two approaches to sequence learning for anomaly detection
    • Under review
    • T. Lane and C. E. Brodley. An empirical study of two approaches to sequence learning for anomaly detection. Machine Learning, 1999. Under review.
    • (1999) Machine Learning
    • Lane, T.1    Brodley, C.E.2
  • 17
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • November
    • J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions of Information and System Security (TISSEC), 3(4), November 2000.
    • (2000) ACM Transactions of Information and System Security (TISSEC) , vol.3 , Issue.4
    • McHugh, J.1
  • 18
    • 21644472211 scopus 로고    scopus 로고
    • ns2
    • ns2. The Network Simulator. http://www.isi.edu/nsnam/ns/ns-documentation.html.
    • The Network Simulator


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.