메뉴 건너뛰기




Volumn 3858 LNCS, Issue , 2006, Pages 82-101

FLIPS: Hybrid adaptive intrusion prevention

Author keywords

Adaptive Response; Intrusion Prevention; Intrusion Tolerance

Indexed keywords

ADAPTIVE RESPONSE; FEEDBACK LEARNING IPS (FLIPS); INSTRUCTION SET RANDOMIZATION (ISR); INTRUSION PREVENTION SYSTEM (IPS); INTRUSION TOLERANCE;

EID: 33745652318     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11663812_5     Document Type: Conference Paper
Times cited : (43)

References (38)
  • 7
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • F. Cuppens and A. Miege. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Security and Privacy, 2002.
    • (2002) IEEE Security and Privacy
    • Cuppens, F.1    Miege, A.2
  • 16
    • 31844441673 scopus 로고    scopus 로고
    • Advanced polymorphic worms: Evading IDS by blending in with normal traffic
    • Georgia Tech College of Computing
    • A. Kolesnikov and W. Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic. Technical report, Georgia Tech College of Computing, 2004
    • (2004) Technical Report
    • Kolesnikov, A.1    Lee, W.2
  • 23
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overflows
    • July/August
    • J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overflows. IEEE Security & Privacy, 2(4):20-27, July/August 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 34
    • 33745637053 scopus 로고    scopus 로고
    • Network-based buffer overflow detection by exploit code analysis
    • May
    • A. Stig, A. Clark, and G. Mohay. Network-based Buffer Overflow Detection by Exploit Code Analysis. In AusCERT Conference, May 2004.
    • (2004) AusCERT Conference
    • Stig, A.1    Clark, A.2    Mohay, G.3
  • 35
    • 3042683635 scopus 로고    scopus 로고
    • Worm and attack early warning: Piercing stealthy reconnaissance
    • May/June
    • S. Stolfo. Worm and Attack Early Warning: Piercing Stealthy Reconnaissance. IEEE Privacy and Security, May/June 2004.
    • (2004) IEEE Privacy and Security
    • Stolfo, S.1
  • 36
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution Via Dynamic Information Flow Tracking. SIGOPS Operating Systems Review, 38(5):85-96, 2004.
    • (2004) SIGOPS Operating Systems Review , vol.38 , Issue.5 , pp. 85-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.