메뉴 건너뛰기




Volumn 93, Issue 10, 2005, Pages 1848-1857

Hi-DRA: Intrusion detection for Internet security

Author keywords

Alert correlation; Anomaly detection; Computer security; Intrusion detection; Misuse detection; Network security; Security

Indexed keywords

ABSTRACTING; COMPUTER NETWORKS; INTERNET; SENSORS; WIDE AREA NETWORKS;

EID: 26244432358     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2005.853547     Document Type: Conference Paper
Times cited : (22)

References (34)
  • 3
    • 4244181748 scopus 로고    scopus 로고
    • Intrusion detection and vulnerability assessment
    • NSS, Cambridgeshire, U.K.
    • NSS Group, "Intrusion detection and vulnerability assessment," NSS, Cambridgeshire, U.K., Tech. Rep., 2000.
    • (2000) Tech. Rep.
  • 4
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • San Antonio, TX
    • V. Paxson, "Bro: a system for detecting network intruders in real-time," presented at the 7th USENIX Security Symp., San Antonio, TX, 1998.
    • (1998) 7th USENIX Security Symp.
    • Paxson, V.1
  • 5
    • 0005977876 scopus 로고    scopus 로고
    • From declarative signatures to misuse IDS
    • W. Lee, L. Mé, and A. Wespi Eds., Lecture Notes in Computer Science
    • J. Pouzol and M. Ducassé, "From declarative signatures to misuse IDS," in Proc. RAID Int. Symp. W. Lee, L. Mé, and A. Wespi Eds., 2001, vol. 2212, Lecture Notes in Computer Science, pp. 1-21.
    • (2001) Proc. RAID Int. Symp. , vol.2212 , pp. 1-21
    • Pouzol, J.1    Ducassé, M.2
  • 9
    • 0003539116 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Seattle, WA
    • M. Roesch, "Snort - lightweight intrusion detection for networks," presented at the USENIX LISA '99 Conf., Seattle, WA.
    • USENIX LISA '99 Conf.
    • Roesch, M.1
  • 12
    • 84861245249 scopus 로고    scopus 로고
    • ISS, [Online]
    • Realsecure. ISS, 2005 [Online]. Available: http://www.iss.net/
    • (2005) Realsecure
  • 14
    • 0027150412 scopus 로고
    • USTAT: A real-time intrusion detection system for UNIX
    • _, "USTAT: A real-time intrusion detection system for UNIX," in Proc. IEEE Symp. Security and Privacy 1993, pp. 16-28.
    • (1993) Proc. IEEE Symp. Security and Privacy , pp. 16-28
  • 17
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection system
    • Mar.
    • K. Ilgun, R. Kemmerer, and P. Porras, "State transition analysis: a rule-based intrusion detection system," IEEE Trans. Softw. Eng., vol. 21, no. 3, pp. 181-199, Mar. 1995.
    • (1995) IEEE Trans. Softw. Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 18
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S. Eckmann, G. Vigna, and R. Kemmerer, "STATL: an attack language for state-based intrusion detection," J. Comput. Secur., vol. 10, no. 1/2, pp. 71-104, 2002.
    • (2002) J. Comput. Secur. , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 19
    • 18744366186 scopus 로고    scopus 로고
    • [Online]
    • Apache 2.0 Documentation. 2002 [Online]. Available: http://www.apache. org/
    • (2002) Apache 2.0 Documentation
  • 22
    • 84947584002 scopus 로고    scopus 로고
    • Designing a web of highly-configurable intrusion detection sensors
    • W. Lee, L. Me, and A. Wespi Eds., Lecture Notes in Computer Science
    • G. Vigna, R. Kemmerer, and P. Blix, "Designing a web of highly-configurable intrusion detection sensors," in Proc. 4th Int. Symp. Recent Advances in Intrusion Detection (RAID 2001) W. Lee, L. Me, and A. Wespi Eds., vol. 2212, Lecture Notes in Computer Science, pp. 69-84.
    • Proc. 4th Int. Symp. Recent Advances in Intrusion Detection (RAID 2001) , vol.2212 , pp. 69-84
    • Vigna, G.1    Kemmerer, R.2    Blix, P.3
  • 24
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • _, "NetSTAT: a network-based intrusion detection system," J. Comput. Secur., vol. 7, no. 1, pp. 37-71, 1999.
    • (1999) J. Comput. Secur. , vol.7 , Issue.1 , pp. 37-71
  • 25
    • 84861266125 scopus 로고    scopus 로고
    • An intrusion detection system for Aglets
    • N. Suri Ed., Lecture Notes in Computer Science
    • G. Vigna, B. Cassell, and D. Fayram, "An intrusion detection system for Aglets," in Proc. 6th Int. Conf. Mobile Agents (MA '02) N. Suri Ed., vol. 2535, Lecture Notes in Computer Science, pp. 64-77.
    • Proc. 6th Int. Conf. Mobile Agents (MA '02) , vol.2535 , pp. 64-77
    • Vigna, G.1    Cassell, B.2    Fayram, D.3
  • 27
    • 77953188431 scopus 로고    scopus 로고
    • Detecting malicious Java code using virtual machine auditing
    • V. Paxson Ed.
    • S. Soman, C. Krintz, and G. Vigna, "Detecting malicious Java code using virtual machine auditing," in Proc. 12th USENIX Security Symp. V. Paxson Ed., 2003, pp. 153-167.
    • (2003) Proc. 12th USENIX Security Symp. , pp. 153-167
    • Soman, S.1    Krintz, C.2    Vigna, G.3
  • 30
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • Jul.
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," CACM, vol. 42, no. 7, pp. 53-61, Jul. 1999.
    • (1999) CACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 31
    • 0006064357 scopus 로고    scopus 로고
    • Addendum to "testing and evaluating computer intrusion detection systems"
    • Sep.
    • _, "Addendum to "testing and evaluating computer intrusion detection systems"," CACM, vol. 42, no. 9, p. 15, Sep. 1999.
    • (1999) CACM , vol.42 , Issue.9 , pp. 15
  • 32
    • 3042821266 scopus 로고    scopus 로고
    • Validation of sensor alert correlators
    • Jan./Feb.
    • J. Haines, D. Ryder, L. Tinnel, and S. Taylor, "Validation of sensor alert correlators," IEEE Security Privacy, vol. 1, no. 1, pp. 46-56, Jan./Feb. 2003.
    • (2003) IEEE Security Privacy , vol.1 , Issue.1 , pp. 46-56
    • Haines, J.1    Ryder, D.2    Tinnel, L.3    Taylor, S.4
  • 33
    • 21944457574 scopus 로고    scopus 로고
    • A comprehensive approach to intrusion detection alert correlation
    • Jul.-Sep.
    • F. Valeur, G. Vigna, C. Kruegel, and R. Kemmerer, "A comprehensive approach to intrusion detection alert correlation," IEEE Trans. Depend. Secure Comput., vol. 1, no. 3, pp. 146-169, Jul.-Sep. 2004.
    • (2004) IEEE Trans. Depend. Secure Comput. , vol.1 , Issue.3 , pp. 146-169
    • Valeur, F.1    Vigna, G.2    Kruegel, C.3    Kemmerer, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.