메뉴 건너뛰기




Volumn 14, Issue 4, 2006, Pages 361-381

Towards an insider threat prediction specification language

Author keywords

Data security; Information systems

Indexed keywords

COMPUTER HARDWARE DESCRIPTION LANGUAGES; INFORMATION TECHNOLOGY; SEMANTICS;

EID: 33746645281     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220610690826     Document Type: Article
Times cited : (28)

References (34)
  • 1
    • 0008302889 scopus 로고    scopus 로고
    • "Use of a taxonomy of security faults"
    • Technical Report TR-96-051, COAST Laboratory, Department of Computer Sciences, Purdue University, IN
    • Aslam, T., Krsul, I. and Spafford, E. (1996), "Use of a taxonomy of security faults", Technical Report TR-96-051, COAST Laboratory, Department of Computer Sciences, Purdue University, IN.
    • (1996)
    • Aslam, T.1    Krsul, I.2    Spafford, E.3
  • 5
    • 33746585668 scopus 로고    scopus 로고
    • "The case against Robert Hanssen"
    • CNN.com available at
    • CNN.com (2002), "The case against Robert Hanssen", available at: http://edition.cnn.com/SPECIALS/2001/hanssen/.
    • (2002)
  • 6
    • 84947258927 scopus 로고    scopus 로고
    • "From a program family to a domain-specific language"
    • Lengauer, C., Batory, D., Consel, C. and Odersky, M. (Eds), Springer-Verlag, New York, NY
    • Consel, C. (2004), "From a program family to a domain-specific language", in Lengauer, C., Batory, D., Consel, C. and Odersky, M. (Eds), Domain-Specific Program Generation, Lecture Notes in Computer Science 3016, Springer-Verlag, New York, NY, pp. 19-29.
    • (2004) Domain-Specific Program Generation, Lecture Notes in Computer Science 3016 , pp. 19-29
    • Consel, C.1
  • 7
    • 0004225165 scopus 로고    scopus 로고
    • "The intrusion detection message exchange format"
    • internet draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 8 July
    • Curry, D., Debar, H. and Feinstein, B. (2004), "The intrusion detection message exchange format", internet draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 8 July.
    • (2004)
    • Curry, D.1    Debar, H.2    Feinstein, B.3
  • 10
    • 0342602262 scopus 로고    scopus 로고
    • "A common intrusion specification language (CISL)"
    • available at 11 June
    • Feiertag, R., Kahn, C., Porras, P., Schnackenberg, D., Staniford-Chen, S. and Tung, B. (1999), "A common intrusion specification language (CISL)", available at: www.isi.edu/~brian/cidf/drafts/ language.txt, 11 June.
    • (1999)
    • Feiertag, R.1    Kahn, C.2    Porras, P.3    Schnackenberg, D.4    Staniford-Chen, S.5    Tung, B.6
  • 11
    • 0012163370 scopus 로고    scopus 로고
    • "The intrusion detection exchange protocol (IDXP)"
    • Internet Draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 22 April 2003, available at
    • Feinstein, B., Matthews, G. and White, J. (2002), "The intrusion detection exchange protocol (IDXP)", Internet Draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 22 April 2003, available at: www.ietf.org/internet-drafts/ draft-ietf-idwg-beep-idxp-07.txt.
    • (2002)
    • Feinstein, B.1    Matthews, G.2    White, J.3
  • 12
    • 0008308204 scopus 로고    scopus 로고
    • "Countermeasures against buffer overflow attacks"
    • White Paper, RSA Laboratories
    • Frykholm, N. (2000), "Countermeasures against buffer overflow attacks", White Paper, RSA Laboratories.
    • (2000)
    • Frykholm, N.1
  • 16
    • 33746587353 scopus 로고    scopus 로고
    • "An architecture for insider misuse threat prediction in IT systems"
    • MPhil Thesis, School of Computing, Communications and Electronics, University of Plymouth, Plymouth
    • Magklaras, G. (2005), "An architecture for insider misuse threat prediction in IT systems", MPhil Thesis, School of Computing, Communications and Electronics, University of Plymouth, Plymouth.
    • (2005)
    • Magklaras, G.1
  • 17
    • 0036173202 scopus 로고    scopus 로고
    • "Insider threat prediction tool: Evaluating the probability of IT misuse"
    • Magklaras, G. and Furnell, S. (2002), "Insider threat prediction tool: evaluating the probability of IT misuse", Computers & Security, Vol. 21 No. 1, pp. 62-73.
    • (2002) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.1    Furnell, S.2
  • 20
    • 33745893010 scopus 로고    scopus 로고
    • NSTISSAM NSTISSAM INFOSEC/1-99, US National Security Telecommunications And Information Systems Security Committee, available at
    • NSTISSAM (1999), The Insider Threat To US Government Information Systems, NSTISSAM INFOSEC/1-99, US National Security Telecommunications And Information Systems Security Committee, available at: www.cnss.gov/ Assets/pdf/nstissam_infosec_1-99.pdf.
    • (1999) The Insider Threat To US Government Information Systems
  • 22
    • 0004037761 scopus 로고
    • "TELNET protocol specification"
    • Request For Comments (RFC) 854, IETF Network Working Group, May
    • Postel, J. and Reynolds, J. (1983), "TELNET protocol specification", Request For Comments (RFC) 854, IETF Network Working Group, May.
    • (1983)
    • Postel, J.1    Reynolds, J.2
  • 24
    • 0041766619 scopus 로고    scopus 로고
    • "2003 CSI/FBI computer crime and security survey"
    • Computer Security Institute. Spring
    • Richardson, R. (2003), "2003 CSI/FBI computer crime and security survey", Computer Security Institute. Spring.
    • (2003)
    • Richardson, R.1
  • 25
    • 0003998307 scopus 로고    scopus 로고
    • Microsoft Press, Redmond, DC
    • Richter, J. (1997), Advanced Windows, Microsoft Press, Redmond, DC.
    • (1997) Advanced Windows
    • Richter, J.1
  • 26
    • 0036395373 scopus 로고    scopus 로고
    • "A framework for understanding and predicting insider attacks"
    • Schultz, E.E. (2002), "A framework for understanding and predicting insider attacks", Computers & Security, Vol. 21 No. 6, pp. 526-31.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 28
    • 33746622841 scopus 로고    scopus 로고
    • "Spying and technology: Robert Philip Hanssen"
    • Slashdot posting on Slashdot.org, 22 February 2001, available at
    • Slashdot (2001), "Spying and technology: Robert Philip Hanssen", posting on Slashdot.org, 22 February 2001, available at: http://slashdot.org/articles/01/02/22/0622249.shtml.
    • (2001)
  • 29
    • 0008390093 scopus 로고    scopus 로고
    • "A preliminary structural approach to insider computer misuse incidents"
    • Tuglular, T. (2000), "A preliminary structural approach to insider computer misuse incidents", EICAR 2000 Best Paper Proceedings, pp. 105-25.
    • (2000) EICAR 2000 Best Paper Proceedings , pp. 105-125
    • Tuglular, T.1
  • 30
    • 33746654464 scopus 로고    scopus 로고
    • "Extensible markup language, architecture domain, world wide web consortium (W3C)"
    • W3C available at
    • W3C (2006), "Extensible markup language, architecture domain, world wide web consortium (W3C)", available at: www.w3.org/XML/.
    • (2006)
  • 32
    • 0342829715 scopus 로고
    • "The SSH (secure shell) remote login protocol"
    • Internet Draft, IETF Network Working Group, 15 November 1995, available at
    • Ylonen, T. (1995), "The SSH (secure shell) remote login protocol", Internet Draft, IETF Network Working Group, 15 November 1995, available at: www.free.lp.se/fish/rfc.txt.
    • (1995)
    • Ylonen, T.1
  • 33
    • 33746596108 scopus 로고    scopus 로고
    • 2nd ed., Chapter 2, New Riders Publishing, Indianapolis, IN
    • Ziegler, R. (2002), LINUX Firewalls, 2nd ed., Chapter 2, New Riders Publishing, Indianapolis, IN, pp. 48-50.
    • (2002) LINUX Firewalls , pp. 48-50
    • Ziegler, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.