메뉴 건너뛰기




Volumn 108, Issue 6, 2003, Pages 453-473

Evaluation of intrusion detection systems

Author keywords

Bayesian statistics; Computer security; Decision analysis; Intrusion detection; Receiver operating characteristic (ROC); Software evaluation

Indexed keywords

COST ACCOUNTING; DECISION THEORY; INTEGRATION; PROBABILITY; SECURITY OF DATA; SOFTWARE ENGINEERING; STATISTICAL METHODS;

EID: 2942631300     PISSN: 1044677X     EISSN: None     Source Type: Journal    
DOI: 10.6028/jres.108.040     Document Type: Article
Times cited : (38)

References (17)
  • 1
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, Testing and evaluating computer intrusion detection systems, Commun. ACM 42 (7), 53-61 (1999).
    • (1999) Commun. ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 2
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems
    • J. McHugh, Testing intrusion detection systems, ACM Trans. Inform. Syst. Secur. 3 (4), 262-294 (2000).
    • (2000) ACM Trans. Inform. Syst. Secur. , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 4
    • 84962238645 scopus 로고    scopus 로고
    • Cost-based modeling for fraud and intrusion detection: Results from the JAM project
    • IEEE Computer Society, Los Alamitos, CA
    • S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan, Cost-based modeling for fraud and intrusion detection: Results from the JAM project, Proceedings of DISCEX 2000, IEEE Computer Society, Los Alamitos, CA (1999).
    • (1999) Proceedings of DISCEX 2000
    • Stolfo, S.1    Fan, W.2    Lee, W.3    Prodromidis, A.4    Chan, P.5
  • 5
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • J. McHugh, A. Christie, and J. Allen, Defending yourself: the role of intrusion detection systems, IEEE Software 17 (5), 42-51 (2000).
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 6
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Trans. Inform. Syst. Secur. 3 (3), 186-205 (2000).
    • (2000) ACM Trans. Inform. Syst. Secur. , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 10
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Trans. Inform. Syst. Secur. 3 (4), 227-261 (2000).
    • (2000) ACM Trans. Inform. Syst. Secur. , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 11
    • 0034827684 scopus 로고    scopus 로고
    • Evaluation of intrusion detectors: A decision theory approach
    • IEEE Computer Society, Los Alamitos, CA
    • J. Gaffney, and J. Ulvila, Evaluation of intrusion detectors: A decision theory approach, Proceedings of the 2001 IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos, CA (2001) pp. 50-61.
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 50-61
    • Gaffney, J.1    Ulvila, J.2
  • 14
    • 0034588633 scopus 로고    scopus 로고
    • On the trail of intrusions into information systems
    • S. Kent, On the trail of intrusions into information systems, IEEE Spectrum 37 (12), 52-56 (2000).
    • (2000) IEEE Spectrum , vol.37 , Issue.12 , pp. 52-56
    • Kent, S.1
  • 15
    • 0035283313 scopus 로고    scopus 로고
    • Robust classification for imprecise environments
    • F. Provost and T. Fawcett, Robust classification for imprecise environments, Machine Learning J. 42 (3), 203-231 (2001).
    • (2001) Machine Learning J. , vol.42 , Issue.3 , pp. 203-231
    • Provost, F.1    Fawcett, T.2
  • 17
    • 0002582136 scopus 로고    scopus 로고
    • Buffer overflows: Attacks and defenses for the vulnerability of the decade
    • IEEE Computer Society, Los Alamitos, CA
    • C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer overflows: Attacks and defenses for the vulnerability of the decade, Proceedings of DISCEX 2000, IEEE Computer Society, Los Alamitos, CA (1999) pp. 154-163.
    • (1999) Proceedings of DISCEX 2000 , pp. 154-163
    • Cowan, C.1    Wagle, P.2    Pu, C.3    Beattie, S.4    Walpole, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.