메뉴 건너뛰기




Volumn 3548, Issue Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings, 2005, Pages 188-205

Improving the efficiency of misuse detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; OPTIMIZATION; SYSTEMS ANALYSIS;

EID: 26444432211     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11506881_12     Document Type: Conference Paper
Times cited : (15)

References (23)
  • 1
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Seattle, WA, USA, USENIX Assoc.
    • M. Roesch: Snort - Lightweight Intrusion Detection for Networks. In: Proc. of the 13th System Administration Conference (LISA 1999), Seattle, WA, USA, pp. 229-238., USENIX Assoc., 1999.
    • (1999) Proc. of the 13th System Administration Conference (LISA 1999) , pp. 229-238
    • Roesch, M.1
  • 2
    • 85037721353 scopus 로고    scopus 로고
    • Netflow services and applications
    • 15 Jul.
    • Cisco Systems Inc.: NetFlow Services and Applications. White Paper. 15 Jul. 2002, http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/ napps_wp.htm
    • (2002) White Paper
  • 3
    • 26444582427 scopus 로고    scopus 로고
    • Set, bags and rock and roll - Analyzing large datasets of network data
    • P. Samarati; D. Gollmann; R. Molva (eds.): Computer Security - ESORICS 2004, Proc. of the 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, Springer Verlag
    • J. McHugh: Set, Bags and Rock and Roll - Analyzing Large Datasets of Network Data. In: P. Samarati; D. Gollmann; R. Molva (eds.): Computer Security - ESORICS 2004, Proc. of the 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, LNCS 3193, pp. 407-422, Springer Verlag, 2004.
    • (2004) LNCS , vol.3193 , pp. 407-422
    • McHugh, J.1
  • 5
    • 35248819234 scopus 로고    scopus 로고
    • Using decision trees to improve signature-based intrusion detection
    • Proc. of the 6th Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, USA, Springer Verlag
    • C. Kruegel, T. Toth: Using Decision Trees to Improve Signature-based Intrusion Detection In: Proc. of the 6th Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, USA, LNCS 2820, pp. 173-191, Springer Verlag, 2003.
    • (2003) LNCS , vol.2820 , pp. 173-191
    • Kruegel, C.1    Toth, T.2
  • 7
    • 35048883095 scopus 로고    scopus 로고
    • A model for the semantics of attack signatures in misuse detection systems
    • Proc. of 7th Information Security Conference (ISC 2004), Palo Alto, CA, USA, Springer
    • M. Meier: A Model for the Semantics of Attack Signatures in Misuse Detection Systems. In: Proc. of 7th Information Security Conference (ISC 2004), Palo Alto, CA, USA, LNCS 3225, pp. 158-169, Springer, 2004.
    • (2004) LNCS , vol.3225 , pp. 158-169
    • Meier, M.1
  • 8
    • 26444469653 scopus 로고    scopus 로고
    • Towards a scalable approach to tailoring the disclosure of pseudonymous audit data to misuse detection signatures
    • U. Flegel, M. Meier: Towards a Scalable Approach to Tailoring the Disclosure of Pseudonymous Audit Data to Misuse Detection Signatures. Internal discussion paper, 2002.
    • (2002) Internal Discussion Paper
    • Flegel, U.1    Meier, M.2
  • 11
    • 0003518833 scopus 로고
    • PhD Thesis, Dept. of Computer Science, Purdue University, West Lafayette, IN, August
    • S. Kumar: Classification and Detection of Computer Intrusions. PhD Thesis, Dept. of Computer Science, Purdue University, West Lafayette, IN, August 1995.
    • (1995) Classification and Detection of Computer Intrusions
    • Kumar, S.1
  • 12
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • IOS Press, Amsterdam, ISSN 0926-227X
    • S.T. Eckmann, G. Vigna, R.A. Kemmerer: STATL: An Attack Language for State-based Intrusion Detection. In: Journal of Computer Security, vol. 10, no. 1/2, pp. 71-104, IOS Press, Amsterdam, 2002, ISSN 0926-227X.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 15
    • 0028711786 scopus 로고
    • Audit reduction and misuse detection in heterogeneous environments: Framework and application
    • Orlando, FL
    • P. E. Proctor: Audit reduction and misuse detection in heterogeneous environments: Framework and application. In: Proc. of the 10th Annual Computer Security Applications Conference, Orlando, FL, pp. 117 - 125, 1994.
    • (1994) Proc. of the 10th Annual Computer Security Applications Conference , pp. 117-125
    • Proctor, P.E.1
  • 17
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the Production-Based Expert System Toolset (P-BEST)
    • Los Alamitos, CA, IEEE Press
    • U. Lindqvist; P. A. Porras: Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In: Proc. of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, pp. 146-161, IEEE Press, 1999.
    • (1999) Proc. of the IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 19
    • 48649092087 scopus 로고
    • RTie inference engine
    • TALARIAN CORPORATION (eds.). Mountain View, Ca, USA
    • TALARIAN CORPORATION: RTie Inference Engine. In: TALARIAN CORPORATION (eds.): RTworks 3.5. Mountain View, Ca, USA, 1995.
    • (1995) RTworks 3.5
  • 21
    • 0020177941 scopus 로고
    • Rete: A fast algorithm for the many pattern/many object pattern match problem
    • 1982
    • C. L. Forgy: Rete: A Fast Algorithm for the Many Pattern/Many Object Pattern Match Problem. In: Artificial Intelligence, 19 (1982) 10, pp. 17-37, 1982.
    • (1982) Artificial Intelligence , vol.19 , Issue.10 , pp. 17-37
    • Forgy, C.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.