메뉴 건너뛰기




Volumn 15, Issue 3, 2004, Pages 391-403

Anomaly detection based on system call classification

Author keywords

Anomaly detection; Intrusion detection; System call

Indexed keywords

CLASSIFICATION (OF INFORMATION); LEARNING SYSTEMS; SOFTWARE PROTOTYPING;

EID: 2942744651     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (11)

References (18)
  • 1
    • 0033293396 scopus 로고    scopus 로고
    • Toward a taxonomy of intrusion-detection systems
    • Debar H, Dacier M, Wespi A. Toward a taxonomy of intrusion-detection systems. Computer Networks, 1999, 31(8): 805-822.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 3
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • Orlando: IEEE Computer Society Press
    • Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs by execution monitoring. In: Proc. of the 10th Annual Computer Security Applications Conf Orlando: IEEE Computer Society Press, 1994. 134-144.
    • (1994) Proc. of the 10th Annual Computer Security Applications Conf. , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 6
    • 85090433665 scopus 로고    scopus 로고
    • Snort-Lightweight intrusion detection for networks
    • Washington: USENIX
    • Marty R. Snort-Lightweight intrusion detection for networks In: Proc. of the 13th Conf. on Systems Administration. Washington: USENIX, 1999. 229-238.
    • (1999) Proc. of the 13th Conf. on Systems Administration , pp. 229-238
    • Marty, R.1
  • 12
    • 0002774999 scopus 로고    scopus 로고
    • Learning patterns from UNIX process execution traces for intrusion detection
    • Providence, Rhode Island: AAAI Press
    • Lee W, Stolfo SJ. Learning patterns from UNIX process execution traces for intrusion detection. In Proc. of the AAAI97 Workshop on AI Methods in Fraud and Risk Management. Providence, Rhode Island: AAAI Press, 1997. 50-56.
    • (1997) Proc. of the AAAI97 Workshop on AI Methods in Fraud and Risk Management , pp. 50-56
    • Lee, W.1    Stolfo, S.J.2
  • 13
    • 1842693637 scopus 로고    scopus 로고
    • A new intrusion detection method based on process profiling
    • Nara: IEEE Computer Society Press
    • Okazaki Y, Sato I, Goto S. A new intrusion detection method based on process profiling In: Proc. of the Symp. on Applications and the Internet. Nara: IEEE Computer Society Press, 2002. 82-90.
    • (2002) Proc. of the Symp. on Applications and the Internet , pp. 82-90
    • Okazaki, Y.1    Sato, I.2    Goto, S.3
  • 15
    • 84947547225 scopus 로고    scopus 로고
    • Experiences with specification-based intrusion detection
    • Lee W., Me L. and Wespi A. (ed.), Davis: Springer-Verlag
    • Uppuluri P, Sekar R. Experiences with specification-based intrusion detection. In: Lee W, Me L, Wespi A, eds. Proc. of the 4th Int'l Symp. on Recent Advances in Intrusion Detection. Davis: Springer-Verlag, 2001. 172-189.
    • (2001) Proc. of the 4th Int'l Symp. on Recent Advances in Intrusion Detection , pp. 172-189
    • Uppuluri, P.1    Sekar, R.2
  • 16
  • 17
    • 2942741960 scopus 로고    scopus 로고
    • The LINUX intrusion detection project
    • Xie HG, Biondi P. The LINUX intrusion detection project. 2002. http://www.lids.org
    • (2002)
    • Xie, H.G.1    Biondi, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.