메뉴 건너뛰기




Volumn 28, Issue 6, 2006, Pages 670-694

Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art

Author keywords

Host based security; Intrusion detection system; Intrusion prevention systems; Network based security; Sniffering; Wireless network

Indexed keywords

CODES (STANDARDS); COMPUTER SOFTWARE; REAL TIME SYSTEMS; RISK ASSESSMENT; SCANNING; SECURITY OF DATA;

EID: 33746150390     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2005.07.002     Document Type: Article
Times cited : (66)

References (34)
  • 2
    • 1242263788 scopus 로고    scopus 로고
    • Mitigation of network tampering using dynamic dispatch of mobile agents
    • www.elsevier.com/locate/cose
    • DeMara R.F., and Rocke A.J. Mitigation of network tampering using dynamic dispatch of mobile agents. Computers and Security vol. 23 (2004) 31-42. http:www.elsevier.com/locate/cose www.elsevier.com/locate/cose
    • (2004) Computers and Security , vol.23 , pp. 31-42
    • DeMara, R.F.1    Rocke, A.J.2
  • 3
    • 1242318271 scopus 로고    scopus 로고
    • Available from: http://snortnet.scorpions.net/snortnet.pdf
    • Fyodor Y. 'SNORTNET'-A Distributed Intrusion Detection System (2000 (June)). http://snortnet.scorpions.net/snortnet.pdf Available from: http://snortnet.scorpions.net/snortnet.pdf
    • (2000) 'SNORTNET'-A Distributed Intrusion Detection System
    • Fyodor, Y.1
  • 8
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: a brief history and overview. Reliable Software Group, Computer Science Department, University of California Santa Barbara
    • Kemmerer R.A., and Vigna G. Intrusion detection: a brief history and overview. Reliable Software Group, Computer Science Department, University of California Santa Barbara. Supplement to Computer Security and Privacy (2002) 27-30
    • (2002) Supplement to Computer Security and Privacy , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 9
    • 0242468747 scopus 로고    scopus 로고
    • An anomaly intrusion detection method by clustering normal user behavior
    • Oh S.H., and Lee W.S. An anomaly intrusion detection method by clustering normal user behavior. Computers & Security 22 7 (2003) 596-612
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 596-612
    • Oh, S.H.1    Lee, W.S.2
  • 22
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 4 (2003) 443-471
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 23
    • 0242637092 scopus 로고    scopus 로고
    • Detecting intrusion with rule-based integration of multiple models
    • Han S., and Cho S. Detecting intrusion with rule-based integration of multiple models. Computers & Security 22 7 (2003) 613-623
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 613-623
    • Han, S.1    Cho, S.2
  • 28
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y., Lee W., and Huang Y. Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks 9 (2003) 545-556
    • (2003) ACM Wireless Networks , vol.9 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 30
    • 33746119684 scopus 로고    scopus 로고
    • H. Debar, M. Dacier, A. Wespi, S. Lampart, An Experimentation Workbench for Intrusion Detection Systems, Research Report RZ 2998, IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, March (1998).
  • 34
    • 33746137945 scopus 로고    scopus 로고
    • Proceedings of Second International Conference on Web Information Systems Engineering (WISE'01) 0-7965-1393-X/02 IEEE
    • Shiyong Z., Chengrong W., and Wei G. Network monitoring in broadband. Proceedings of Second International Conference on Web Information Systems Engineering (WISE'01) (2002) 0-7965-1393-X/02 IEEE
    • (2002) Network monitoring in broadband
    • Shiyong, Z.1    Chengrong, W.2    Wei, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.