메뉴 건너뛰기




Volumn 24, Issue 5, 2005, Pages 387-398

CIDS: An agent-based intrusion detection system

Author keywords

Cougaar; Decision support; Intrusion detection; Plugin; Security agents

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CRIME; COMPUTER NETWORKS;

EID: 24344493979     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.01.004     Document Type: Article
Times cited : (46)

References (37)
  • 1
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • January
    • Allen J, et al. State of the practice of intrusion detection technologies. Technical report (no. CMU/SEI-99-TR-028); January 2000.
    • (2000) Technical Report , vol.CMU-SEI-99-TR-028
    • Allen, J.1
  • 2
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P Anderson Co., Fort Washington, PA; April 15
    • Anderson JP. Computer security threat monitoring and surveillance. Technical report. James P Anderson Co., Fort Washington, PA; April 15, 1980.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 4
    • 0003337684 scopus 로고    scopus 로고
    • A method of tracing intruders by use of mobile agents
    • June
    • Asaka M, Okazawa S, Taguchi A, Goto S. A method of tracing intruders by use of mobile agents. INET'99; June 1999b.
    • (1999) INET'99
    • Asaka, M.1    Okazawa, S.2    Taguchi, A.3    Goto, S.4
  • 8
    • 33646686429 scopus 로고    scopus 로고
    • Multisensor data fusion for next generation distributed intrusion detection systems
    • Invited paper The Johns Hopkins University Applied Physics Laboratory; 24-27 May
    • Bass T. Multisensor data fusion for next generation distributed intrusion detection systems. Invited paper, 1999 IRIS national symposium on sensor and data fusion. The Johns Hopkins University Applied Physics Laboratory; 24-27 May 1999.
    • (1999) 1999 IRIS National Symposium on Sensor and Data Fusion
    • Bass, T.1
  • 13
    • 27544490143 scopus 로고    scopus 로고
    • Open source software available from the website
    • Cougaar: a cognitive agent architecture. Open source software available from the website (www.cougaar.org ).
    • Cougaar: A Cognitive Agent Architecture
  • 16
  • 17
    • 23944487084 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • Computer Science/Mathematics
    • Debar H, Dacier M, Wepspi A. A revised taxonomy for intrusion detection systems. Technical report, Computer Science/Mathematics; 1999.
    • (1999) Technical Report
    • Debar, H.1    Dacier, M.2    Wepspi, A.3
  • 23
    • 33745253038 scopus 로고    scopus 로고
    • Intrusion detection message exchange format
    • Intrusion Detection Working Group. IETF Internet Draft 'draft-ietf-idwg-idmef-xml-01.txt'. By David A. Curry (Internet Security Systems, Inc.)
    • Intrusion Detection Message Exchange Format. Extensible Markup Language (XML) Document Type Definition. Intrusion Detection Working Group. IETF Internet Draft 'draft-ietf-idwg-idmef-xml-01.txt'. By David A. Curry (Internet Security Systems, Inc.). 2000-07.
    • (2000) Extensible Markup Language (XML) Document Type Definition
  • 24
    • 0141590483 scopus 로고    scopus 로고
    • Applying mobile agents to intrusion detection and response
    • National Institute of Standards and Technology Computer Security Division October
    • Jansen W, Mell P, Karygiannis T, Marks D. Applying mobile agents to intrusion detection and response. National Institute of Standards and Technology Computer Security Division, NIST Interim Report (IR) - 6416; October 1999.
    • (1999) NIST Interim Report (IR) , vol.6416
    • Jansen, W.1    Mell, P.2    Karygiannis, T.3    Marks, D.4
  • 27
    • 24344456201 scopus 로고    scopus 로고
    • Distributed systems group, Technical University Vienna, Argentinierstrasse 8, A-1040 Vienna, Austria; April 30
    • Krügel C, Toth T. Applying mobile agent technology to intrusion detection. Distributed systems group, Technical University Vienna, Argentinierstrasse 8, A-1040 Vienna, Austria; April 30, 2002.
    • (2002) Applying Mobile Agent Technology to Intrusion Detection
    • Krügel, C.1    Toth, T.2
  • 28
    • 24344435755 scopus 로고    scopus 로고
    • Sparta - A security policy reinforcement tool for large networks
    • submitted to
    • Krügel C, Toth T. Sparta - a security policy reinforcement tool for large networks, submitted to I-NetSec 01, 2001.
    • (2001) I-NetSec 01
    • Krügel, C.1    Toth, T.2
  • 31
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee, and S. Stolfo A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security 3 4 November 2000
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4
    • Lee, W.1    Stolfo, S.2
  • 32
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive intrusion detection: A data mining approach
    • W. Lee, S. Stolfo, and K. Mok Adaptive intrusion detection: a data mining approach Artificial Intelligence Review 14 6 December 2000 533 567 Kluwer Academic Publishers
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1    Stolfo, S.2    Mok, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.