메뉴 건너뛰기




Volumn 12, Issue 5, 2004, Pages 777-798

Cost effective management frameworks for intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

COST EFFECTIVENESS; DECISION MAKING; INDUSTRIAL MANAGEMENT; INFORMATION TECHNOLOGY; PROBLEM SOLVING; STRATEGIC PLANNING;

EID: 27844527031     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2004-12506     Document Type: Article
Times cited : (19)

References (20)
  • 1
    • 0000010513 scopus 로고    scopus 로고
    • Network based intrusion detection: A review of technologies
    • K. Richards, Network based intrusion detection: a review of technologies, Computers & Security 18 (1999), 671-682.
    • (1999) Computers & Security , vol.18 , pp. 671-682
    • Richards, K.1
  • 2
    • 0037024115 scopus 로고    scopus 로고
    • Evaluation of the performance of IDS systems in a switched and distributed environment
    • C. Iheagwara et al., Evaluation of the performance of IDS systems in a switched and distributed environment, Computer Networks 39 (2002), 93-112.
    • (2002) Computer Networks , vol.39 , pp. 93-112
    • Iheagwara, C.1
  • 3
    • 0037244227 scopus 로고    scopus 로고
    • A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
    • C. Iheagwara et al., A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment, Journal of Computer Security 11(1) (2003).
    • (2003) Journal of Computer Security , vol.11 , Issue.1
    • Iheagwara, C.1
  • 5
    • 27844454587 scopus 로고    scopus 로고
    • Cost-based modeling for fraud and intrusion detection results from the JAM project
    • Columbia University
    • S. Stolfo et al., Cost-Based Modeling for Fraud and Intrusion Detection Results from the JAM Project, Technical Report, Columbia University.
    • Technical Report
    • Stolfo, S.1
  • 9
    • 27844535509 scopus 로고    scopus 로고
    • A preliminary classification scheme for information system threats, attacks, and defenses; a cause and effect model; and some analysis based on that model
    • September
    • Cohen et al., A preliminary classification scheme for information system threats, attacks, and defenses; a cause and effect model; and some analysis based on that model, Sandia National Laboratories, September, 1998.
    • (1998) Sandia National Laboratories
    • Cohen1
  • 10
    • 85039380291 scopus 로고
    • Federal information processing standards
    • National Institute of Standards and Technology, FIPS PUB 191, November
    • Federal Information Processing Standards, Guideline for the Analysis of Local Area Network Security. National Institute of Standards and Technology, FIPS PUB 191, November 1994; http://www.itl.nist.gov/fipspubs/fip191.htm.
    • (1994) Guideline for the Analysis of Local Area Network Security
  • 11
    • 2142850601 scopus 로고
    • Computer matching by government agencies: The failure of cost/benefit analysis as a control mechanism
    • R. Clarke, Computer matching by government agencies: The failure of cost/benefit analysis as a control mechanism, Information Infrastructure and Policy 4, 1 (March) (1995); http://www.anu.edu.au/people/Roger.Clarke/DV/ MatchCBA.html.
    • (1995) Information Infrastructure and Policy , vol.4 , Issue.1 MARCH
    • Clarke, R.1
  • 14
    • 0003320305 scopus 로고    scopus 로고
    • A cost-based security analysis of symmetric and asymmetric key lengths
    • R.D. Silverman, A cost-based security analysis of symmetric and asymmetric key lengths, RSA Laboratories Bulletin 13 (April) (2000).
    • (2000) RSA Laboratories Bulletin , vol.13 , Issue.APRIL
    • Silverman, R.D.1
  • 15
    • 4944234006 scopus 로고    scopus 로고
    • Return on information security investments: Myths vs. realities
    • L. Gordon et al., Return on information security investments: Myths vs. realities. Strategic Finance Magazine (Nov.) (2002); http://www. strategicfinancemag.com/2002/11i.htm.
    • (2002) Strategic Finance Magazine , Issue.NOV.
    • Gordon, L.1
  • 17
    • 27844529722 scopus 로고    scopus 로고
    • The effect of intrusion detection management methods on the return on investment
    • accepted
    • C. Iheagwara, The effect of intrusion detection management methods on the return on investment, Computers & Security Journal (October) (2003) (accepted).
    • (2003) Computers & Security Journal , Issue.OCTOBER
    • Iheagwara, C.1
  • 18
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar et al., Towards a taxonomy of intrusion-detection systems. Computer Networks 31 (1999).
    • (1999) Computer Networks , vol.31
    • Debar, H.1
  • 19
    • 85039380825 scopus 로고    scopus 로고
    • http://www.silicondefense.com/software/acbm/speed_of_snort_03_16_2001. pdf.
  • 20
    • 85039363477 scopus 로고    scopus 로고
    • http://www.nss.co.uk/Articles/IntrusionDetection.htm.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.