메뉴 건너뛰기




Volumn 6, Issue 2, 2003, Pages 173-200

Bluebox: A policy-driven, host-based intrusion detection system

Author keywords

Intrusion detection; Policy; Sandboxing; System call introspection

Indexed keywords

COMMUNICATION FLOW; INTRUSION DETECTION; SANDBOXING; SYSTEM CALL INTROSPECTION;

EID: 2942749266     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/762476.762477     Document Type: Article
Times cited : (92)

References (37)
  • 1
    • 0006888659 scopus 로고
    • Safeguard final report: Detecting unusual program behavior using the NIDES statistical component
    • Computer Science Laboratory, SRI International, Menlo Park, CA, USA
    • ANDERSON, D., LUNT, T. F., JAVITZ, H., TAMAHU, A., AND VALDES, A. 1993. SAFEGUARD FINAL REPORT: Detecting unusual program behavior using the NIDES statistical component, Tech. Rep., Computer Science Laboratory, SRI International, Menlo Park, CA, USA.
    • (1993) Tech. Rep.
    • Anderson, D.1    Lunt, T.F.2    Javitz, H.3    Tamahu, A.4    Valdes, A.5
  • 3
    • 0003227185 scopus 로고
    • Security architecture for the Internet protocol
    • ATKINSON, R. 1995. Security architecture for the Internet protocol. Internet RFC 1825.
    • (1995) Internet RFC , vol.1825
    • Atkinson, R.1
  • 6
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • BISHOP, M. AND DILGER, M. 1996. Checking for race conditions in file accesses. Computing Syst. 9, 2, 131-152.
    • (1996) Computing Syst. , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 9
    • 0004135984 scopus 로고    scopus 로고
    • IDIOT users guide
    • COAST Laboratory, Dept. of Computer Sciences, Purdue University
    • CROSBIE, M., DOLE, B., ELLIS, T., KRSUL, I., AND SPAFFORD, E. 1996. IDIOT users guide. Tech. Report CSD-TR-96-050, COAST Laboratory, Dept. of Computer Sciences, Purdue University.
    • (1996) Tech. Report , vol.CSD-TR-96-050
    • Crosbie, M.1    Dole, B.2    Ellis, T.3    Krsul, I.4    Spafford, E.5
  • 10
    • 3142581492 scopus 로고    scopus 로고
    • Fixed vs. variable-length patterns for detecting suspicious process behavior
    • IBM Research Division, Zurich Research Lab.
    • DEBAR, H., DACIER, M., NASSEHI, M., AND WESPI, A. 1998. Fixed vs. variable-length patterns for detecting suspicious process behavior. Research Report, No. RZ3012, IBM Research Division, Zurich Research Lab.
    • (1998) Research Report, No. RZ3012 , vol.RZ3012
    • Debar, H.1    Dacier, M.2    Nassehi, M.3    Wespi, A.4
  • 11
    • 0033293396 scopus 로고    scopus 로고
    • Towars a taxonomy of intrusion detection systems
    • DEBAR, H., DACIER, M., AND WESPI, A. 1999. Towars a taxonomy of intrusion detection systems. Computer Networks 31.
    • (1999) Computer Networks , vol.31
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 18
    • 3142543303 scopus 로고    scopus 로고
    • Intrusion detection system (IDS) product review
    • IBM Research Division, Zurich Research Lab.
    • JACKSON, K. A. 1999. Intrusion Detection System (IDS) product review. IBM internal confidential document, IBM Research Division, Zurich Research Lab.
    • (1999) IBM Internal Confidential Document
    • Jackson, K.A.1
  • 20
    • 0004118981 scopus 로고
    • The NIDES statistical component description and justification
    • Computer Science Laboratory, SRI International, Menlo Park, Cal., USA
    • JAVITZ, H. AND VALDES, A. 1994. The NIDES statistical component description and justification. Tech. Rep., Computer Science Laboratory, SRI International, Menlo Park, Cal., USA.
    • (1994) Tech. Rep.
    • Javitz, H.1    Valdes, A.2
  • 26
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • PAXSON, V. 1998. Bro: A system for detecting network intruders in real-time. In the 7th USENIX Security Symposium.
    • (1998) The 7th USENIX Security Symposium
    • Paxson, V.1
  • 29
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion detection systems from high-level specifications
    • SEKAR, R. AND UPPULURI, P. 1999. Synthesizing fast intrusion detection systems from high-level specifications. In the 8th USENIX Security Symposium, 63-78.
    • (1999) The 8th USENIX Security Symposium , pp. 63-78
    • Sekar, R.1    Uppuluri, P.2
  • 31
    • 0242671076 scopus 로고    scopus 로고
    • Janus: An approach for confinement of untrusted applications
    • University of California at Berkeley
    • WAGNER, D. A. 1999. Janus: An approach for confinement of untrusted applications. Tech. Rep. CSD-99-1056, University of California at Berkeley.
    • (1999) Tech. Rep. , vol.CSD-99-1056
    • Wagner, D.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.