메뉴 건너뛰기




Volumn 17, Issue 4, 2006, Pages 885-897

Quantitative hierarchical threat evaluation model for network security

Author keywords

Intrusion detection system; Network security; Threat evaluation model; Threat index; Threat situation

Indexed keywords

BANDWIDTH; COMPUTATIONAL METHODS; EVALUATION; SECURITY OF DATA; SERVERS;

EID: 33745170386     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.1360/jos170885     Document Type: Article
Times cited : (221)

References (20)
  • 1
    • 84867339043 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • Oakland
    • Cuppens F, Miege A. Alert correlation in a cooperative intrusion detection framework. In: IEEE Symp. on Security and Privacy. Oakland, 2002. 12-15. http://ieeexplore.ieee.org/iel5/7873/21681/01004372.pdf-tp= and arnumber=1004372 and isnumber=21681
    • (2002) IEEE Symp. on Security and Privacy , pp. 12-15
    • Cuppens, F.1    Miege, A.2
  • 2
    • 33646844014 scopus 로고    scopus 로고
    • Statistical causality analysis of INFOSEC alert data
    • Pittsburgh
    • Qin XZ, Lee WK. Statistical causality analysis of INFOSEC alert data. In: Proc. of the 6th Int'l Symp. on Recent Advances in Intrusion Detection. Pittsburgh, 2003. 73-93. http://www.springerlink.com/media/ c5jhqhlrukegjxhpyddj/contributions/u/t/m/h/utmhwugc5lwjnfh6_html/ BodyRef/PDF/558_10953587_Chapter_5.pdf
    • (2003) Proc. of the 6th Int'l Symp. on Recent Advances in Intrusion Detection , pp. 73-93
    • Qin, X.Z.1    Lee, W.K.2
  • 3
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion systems and multisensor data fusion: Creating cyberspace situational awareness
    • Bass T. Intrusion systems and multisensor data fusion: Creating cyberspace situational awareness. Communications of the ACM, 2000, 43(4): 99-105.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 4
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. on Software Engineering, 1999, 25(5): 633-651.
    • (1999) IEEE Trans. on Software Engineering , vol.25 , Issue.5 , pp. 633-651
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 7
    • 33646686429 scopus 로고    scopus 로고
    • Multisensor data fusion for next generation distributed intrusion detection systems
    • Laurel
    • Bass T. Multisensor data fusion for next generation distributed intrusion detection systems. In: 1999 IRIS National Symp. on Sensor and Data Fusion. Laurel, 1999. 24-27.
    • (1999) 1999 IRIS National Symp. on Sensor and Data Fusion , pp. 24-27
    • Bass, T.1
  • 10
    • 4544270125 scopus 로고    scopus 로고
    • Impact analysis of faults and attacks in large-scale networks
    • Hariri S, Qu GZ, Dharmagadda T, et al. Impact analysis of faults and attacks in large-scale networks. IEEE Security and Privacy, 2003, 1(5): 49-54.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.5 , pp. 49-54
    • Hariri, S.1    Gu, G.Z.2    Dharmagadda, T.3
  • 11
    • 33745123491 scopus 로고    scopus 로고
    • Managing network security attack and defense strategies
    • Cohen F. Managing network security attack and defense strategies. 2004. http://www.blacksheepnetworks.com/security/info/misc/9907.html
    • (2004)
    • Cohen, F.1
  • 12
    • 0346336040 scopus 로고    scopus 로고
    • Footprinting for intrusion detection and threat assessment
    • Blyth A. Footprinting for intrusion detection and threat assessment. Information Security Technical Report, 1999, 4(3): 43-53.
    • (1999) Information Security Technical Report , vol.4 , Issue.3 , pp. 43-53
    • Blyth, A.1
  • 14
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • Zurich
    • Lippmann R, Webster S, Stetson D. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In: Proc. of the 15th Int'l Symp. on Recent Advances in Intrusion Detection. Zurich, 2002. 307-326. http://www.springerlink.com/media/320e3xk18j1vuwbe6k1p/ contributions/w/2/6/5/w265fm4f77n2nm7a.pdf
    • (2002) Proc. of the 15th Int'l Symp. on Recent Advances in Intrusion Detection , pp. 307-326
    • Lippmann, R.1    Webster, S.2    Stetson, D.3
  • 16
    • 35449000276 scopus 로고    scopus 로고
    • Snort users manual, snort release 2.0.0
    • Roesch M, Green C. Snort users manual, snort release 2.0.0. 2003. http://www.snort.org/docs/SnortUsersManual.pdf
    • (2003)
    • Roesch, M.1    Green, C.2
  • 17
    • 33745148044 scopus 로고    scopus 로고
    • A framework for network vulnerability analysis
    • Qu GZ, Pakash J, Kishore R, Hariri S. A framework for network vulnerability analysis. 2003. http://www.ece.arizona.edu/-hpdc/projects/nvat/NV-framework.pdf
    • (2003)
    • Qu, G.Z.1    Pakash, J.2    Kishore, R.3    Hariri, S.4
  • 18
    • 33745120982 scopus 로고    scopus 로고
    • Know your enemy: Statistics
    • Project H. Know your enemy: Statistics. 2002. http://www.honeynet.org/papers/stats/
    • (2002)
    • Project, H.1
  • 19
    • 33745167835 scopus 로고    scopus 로고
    • Project H. Scan 17
    • Project H. Scan 17. 2002. http://www.honeynet.org/scans/scan17/
    • (2002)
  • 20
    • 33745172942 scopus 로고    scopus 로고
    • Serv-U FTP directory traversal vulnerability
    • TM
    • TM. Serv-U FTP directory traversal vulnerability. 2003. http://www.securityfocus.com/bid/2052
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.