메뉴 건너뛰기




Volumn , Issue , 2005, Pages 216-225

The effects of algorithmic diversity on anomaly detector performance

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMIC DIVERSITY; ANOMALY-BASED INTRUSION DETECTION; CORRELATION TECHNIQUES; PERFORMANCE SHORTCOMING;

EID: 27544486362     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2005.91     Document Type: Conference Paper
Times cited : (10)

References (21)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P. Anderson Co., Fort Washington, Pennsylvania, April
    • James P. Anderson, "Computer Security Threat Monitoring and Surveillance", Technical report, James P. Anderson Co., Fort Washington, Pennsylvania, April 1980.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 2
    • 0031209960 scopus 로고    scopus 로고
    • The threat from the net
    • August
    • Matt Bishop, Steven Cheung, and Chris Wee, "The Threat from the Net", 34(8) IEEE Spectrum, pages 56-63, August 1997.
    • (1997) IEEE Spectrum , vol.34 , Issue.8 , pp. 56-63
    • Bishop, M.1    Cheung, S.2    Wee, C.3
  • 3
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • April
    • Herve Debar, Marc Dacier and Andreas Wespi, "Towards a Taxonomy of Intrusion-Detection Systems", Computer Networks, 31(8), pages 805-822, April 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 4
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • Dorothy Denning, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, SE-13(2). pages 222-232, Feb. 1987.
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 5
    • 35048870265 scopus 로고    scopus 로고
    • Redundancy and diversity in security
    • Sophia Antipolis, France, September 2004, Lecture Notes In Computer Science # 3193, Springer-Verlag, Berlin
    • Bev Littlewood and Lorenzo Strigini, "Redundancy and Diversity in Security", In Proceedings ESORICS 2004, 9th European Symposium on Research in Computer Security, pages 423-438, Sophia Antipolis, France, September 2004, Lecture Notes In Computer Science # 3193, Springer-Verlag, Berlin, 2004.
    • (2004) Proceedings ESORICS 2004, 9th European Symposium on Research in Computer Security , pp. 423-438
    • Littlewood, B.1    Strigini, L.2
  • 7
    • 0029716418 scopus 로고    scopus 로고
    • A sense of self for unix processes
    • 06-08 May, Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA
    • Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff, "A Sense of Self for Unix Processes", In Proc. 1996 IEEE Symp. on Security and Privacy, pp. 120-128, 06-08 May 1996, Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA.
    • (1996) Proc. 1996 IEEE Symp. on Security and Privacy , pp. 120-128
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3    Longstaff, T.A.4
  • 10
    • 85019678573 scopus 로고    scopus 로고
    • Detecting anomalous and unknown intrusions against programs
    • Scottsdale, AZ, 07-11 December . IEEE Computer Security Press, Los Alamitos, CA
    • Anup Gosh, James Wanken, and Frank Charron "Detecting Anomalous and Unknown Intrusions Against Programs", In Proceedings of the 14th Annual Computer Security Applications Conference, pages 259-267, Scottsdale, AZ, 07-11 December 1998. IEEE Computer Security Press, Los Alamitos, CA.
    • (1998) Proceedings of the 14th Annual Computer Security Applications Conference , pp. 259-267
    • Gosh, A.1    Wanken, J.2    Charron, F.3
  • 15
    • 0036472459 scopus 로고    scopus 로고
    • Anomaly detection in embedded systems
    • February
    • Roy A. Maxion and Kymie M. C. Tan, "Anomaly Detection in Embedded Systems", IEEE Transactions on Computers, 51(2), pages 108-120, February 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.2 , pp. 108-120
    • Maxion, R.A.1    Tan, K.M.C.2
  • 16
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • Andreas Wespi, Giovanni Vigna and Luca Deri (Eds.), 16-18 October 2002, Zurich, Switzerland, Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin
    • Kymie M. C. Tan; Kevin S. Killourhy, and Roy A. Maxion, "Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits", In Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), Andreas Wespi, Giovanni Vigna and Luca Deri (Eds.), 16-18 October 2002, Zurich, Switzerland, pp. 54-73. Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin, 2002.
    • (2002) Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002) , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 17
    • 0036085540 scopus 로고    scopus 로고
    • 'Why 6?' Defining the operational limits of slide, an anomaly-based intrusion detector
    • 12-15 May, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA
    • Kymie M. C. Tan and Roy A. Maxion, " 'Why 6?' Defining the Operational Limits of slide, an Anomaly-Based Intrusion Detector", In Proceedings 2002 IEEE Symposium on Security and Privacy, pages 188-201, 12-15 May 2002, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA.
    • (2002) Proceedings 2002 IEEE Symposium on Security and Privacy , pp. 188-201
    • Tan, K.M.C.1    Maxion, R.A.2
  • 18
    • 0025548907 scopus 로고
    • Security audit trail analysis using inductively generated predictive rules
    • IEEE Service Center, Piscataway, NJ, March
    • Henry S. Teng, Kaihu Chen, and Stephen C-Y Lu, "Security Audit Trail Analysis Using Inductively Generated Predictive Rules", In Proc. of the Sixth Conference on Artificial Intelligence Applications, pages 24-29, IEEE Service Center, Piscataway, NJ, March 1990.
    • (1990) Proc. of the Sixth Conference on Artificial Intelligence Applications , pp. 24-29
    • Teng, H.S.1    Chen, K.2    Lu, S.C.-Y.3
  • 19
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based intrusion detection systems
    • 18-22 Nov., Washington, DC. ACM Press, New York, NY, USA
    • David Wagner and Paolo Soto. "Mimicry attacks on host-based intrusion detection systems", In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 55-264, 18-22 Nov. 2002, Washington, DC. ACM Press, New York, NY, USA.
    • (2002) Proceedings of the 9th ACM Conference on Computer and Communications Security , pp. 55-264
    • Wagner, D.1    Soto, P.2
  • 20
    • 0032639421 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • 09-12 May Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA
    • Christina Warrender, Stephanie Forrest and Barak Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models", In Proceedings 1999 IEEE Symposium on Security and Privacy, pages 133-145, 09-12 May 1999, Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA.
    • (1999) Proceedings 1999 IEEE Symposium on Security and Privacy , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.