메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 527-546

Towards an information-theoretic framework for analyzing intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY; SECURITY OF DATA; SET THEORY; SYSTEMS ANALYSIS;

EID: 33750264822     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_32     Document Type: Conference Paper
Times cited : (24)

References (31)
  • 1
    • 0141723181 scopus 로고    scopus 로고
    • Kdd cup 1999 data. Available at http://kdd.ics.uci.edu/databases/ kddcup99/, 2006.
    • Kdd Cup 1999 Data
  • 2
    • 2442424268 scopus 로고    scopus 로고
    • Naive bayes vs decision trees in intrusion detection systems
    • Nahla Ben Amor, Salem Benferhat, and Zied Elouedi. Naive bayes vs decision trees in intrusion detection systems. In SAC '04, 2004.
    • (2004) SAC '04
    • Amor, N.B.1    Benferhat, S.2    Elouedi, Z.3
  • 3
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • November
    • S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of ACM CCS'1999, November 1999.
    • (1999) Proceedings of ACM CCS'1999
    • Axelsson, S.1
  • 4
    • 0003524305 scopus 로고    scopus 로고
    • A preliminary attempt to apply detection and estimation theory to intrusion detection
    • Dept. of Computer Engineering, Chalmers Univerity of Technology, Sweden, March
    • Stefan Axelsson. A preliminary attempt to apply detection and estimation theory to intrusion detection. Technical Report 00-4, Dept. of Computer Engineering, Chalmers Univerity of Technology, Sweden, March 2000.
    • (2000) Technical Report 00-4
    • Axelsson, S.1
  • 8
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • Herve' Debar, Marc Dacier, and Andreas Wespi. Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8):805-822, 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 11
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Mark Handley, Vern Paxson, and Christian Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security Symposium 2001, 2001.
    • (2001) Proc. USENIX Security Symposium 2001
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 12
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • September
    • P. Helman and G. Liepins. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering, 19(9), September 1993.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.9
    • Helman, P.1    Liepins, G.2
  • 14
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Hyang-Ah Kim and Brad Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security Symposium, pages 271-286, 2004.
    • (2004) USENIX Security Symposium , pp. 271-286
    • Kim, H.-A.1    Karp, B.2
  • 15
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Anukool Lakhina, Mark Crovella, and Christophe Diot. Mining anomalies using traffic feature distributions. In SIGCOMM '05, 2005.
    • (2005) SIGCOMM '05
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 17
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Wenke Lee and Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):p.227-261, 2000.
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 20
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory
    • November
    • John McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory. ACM Transactions on Information and System Security, 3(4), November 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4
    • McHugh, J.1
  • 22
    • 33745772237 scopus 로고    scopus 로고
    • Polygraph: Automatically generating signatures for polymorphic worms
    • James Newsome, Brad Karp, and Dawn Song. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE S&P '05, 2005.
    • (2005) IEEE S&P '05
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 23
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • Vern Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, December 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 24
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks Inc., January
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January 1998.
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 26
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • M. Roesch. Snort - lightweight intrusion detection for networks. In Proceedings of USENIX LISA'99, 1999.
    • (1999) Proceedings of USENIX LISA'99
    • Roesch, M.1
  • 27
    • 14844324904 scopus 로고    scopus 로고
    • Enhancing byte-level network intrusion detection signatures with context
    • Robin Sommer and Vern Paxson. Enhancing byte-level network intrusion detection signatures with context. In CCS '03, 2003.
    • (2003) CCS '03
    • Sommer, R.1    Paxson, V.2
  • 29
    • 84941148984 scopus 로고    scopus 로고
    • Sullo. Nikto, 2006. Available at http://www.cirt.net/code/nikto.shtml.
    • (2006)
  • 31
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • September
    • Ke Wang and Salvatore J. Stolfo. Anomalous payload-based network intrusion detection. In Proceedings of RAID'2004, September 2004.
    • (2004) Proceedings of RAID'2004
    • Wang, K.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.