메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 12-31

An intelligent detection and response strategy to false positives and network attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; FEEDBACK; INTELLIGENT AGENTS; PACKET NETWORKS; SECURITY OF DATA; STRATEGIC PLANNING;

EID: 33750959951     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWIA.2006.4     Document Type: Conference Paper
Times cited : (21)

References (31)
  • 1
    • 0025603636 scopus 로고
    • A policy model for denial of service
    • Franconia, NH USA, June. IEEE Computer Society Press
    • E. Amoroso. A policy model for denial of service. In Proceedings of the Computer Security Foundations Workshop III, pages 110-997, Franconia, NH USA, June 1990. IEEE Computer Society Press.
    • (1990) Proceedings of the Computer Security Foundations Workshop III , pp. 110-997
    • Amoroso, E.1
  • 2
    • 33745467790 scopus 로고    scopus 로고
    • Towards a third generation data capture architecture for honeynets
    • United States Military Academy, West Point, NY, USA, June 15-17. IEEE Computer Society Press
    • E. Balas and C. Viecco. Towards a third generation data capture architecture for honeynets. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pages 110-997, United States Military Academy, West Point, NY, USA, June 15-17 2005. IEEE Computer Society Press.
    • (2005) Proceedings of the 2005 IEEE Workshop on Information Assurance and Security , pp. 110-997
    • Balas, E.1    Viecco, C.2
  • 5
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • July
    • J. Crampton and G. Loizou. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System Security, 6(2):201-231, July 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.2 , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 8
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • volume 2212 of Lecture Notes in Computer Science. Springer-Verlag
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection(RAID2001), volume 2212 of Lecture Notes in Computer Science, pages 85-103. Springer-Verlag, 2001.
    • (2001) Recent Advances in Intrusion Detection(RAID2001) , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 11
    • 33745434223 scopus 로고    scopus 로고
    • Detecting honeypots and other suspicious environments
    • United States Military Academy, West Point, NY, USA, June 15-17. IEEE Computer Society Press
    • T. Holz and F. Raynal. Detecting honeypots and other suspicious environments. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, USA, June 15-17 2005. IEEE Computer Society Press.
    • (2005) Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
    • Holz, T.1    Raynal, F.2
  • 12
    • 0003509661 scopus 로고    scopus 로고
    • IANA Network Working Group. Assigned Numbers Authority Network Working Group
    • IANA Network Working Group. RFC1918: Address Allocation for Private Internets, 1996. Assigned Numbers Authority Network Working Group, http://www.rfc-editor.org/rfc/rfcl918.
    • (1996) RFC1918: Address Allocation for Private Internets
  • 13
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • San Diego, CA, February. Internet Society
    • A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of 1999 Network and Distributed Systems Security Symposium NDSS, pages 151-165, San Diego, CA, February 1999. Internet Society.
    • (1999) Proceedings of 1999 Network and Distributed Systems Security Symposium NDSS , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 16
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • Volume 2516 of Lecture Notes in Computer Science
    • R. Lippmann, S. Webster, and D. Stetson. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 2516 of Lecture Notes in Computer Science: 307-326, 2002.
    • (2002) Computer Networks: The International Journal of Computer and Telecommunications Networking , pp. 307-326
    • Lippmann, R.1    Webster, S.2    Stetson, D.3
  • 17
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA Lincoln Laboratory evaluation data for network anomaly detection
    • volume 2820 of Lecture Notes in Computer Science. Springer-Verlag
    • M. Mahoney and P. Chan. An analysis of the 1999 DARPA Lincoln Laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection (RAID2003), volume 2820 of Lecture Notes in Computer Science, pages 220-237. Springer-Verlag, 2003.
    • (2003) Recent Advances in Intrusion Detection (RAID2003) , pp. 220-237
    • Mahoney, M.1    Chan, P.2
  • 20
    • 77956988169 scopus 로고    scopus 로고
    • M2D2: A formal data model for IDS alert correlation
    • volume 2515 of Lecture Notes in Computer Science. Springer-Verlag
    • B. Morin, L. Me, H. Debar, and M. Ducasse. M2D2: A formal data model for IDS alert correlation. In Recent Advances in Intrusion Detection (RAID2002), volume 2515 of Lecture Notes in Computer Science, pages 115-137. Springer-Verlag, 2002.
    • (2002) Recent Advances in Intrusion Detection (RAID2002) , pp. 115-137
    • Morin, B.1    Me, L.2    Debar, H.3    Ducasse, M.4
  • 22
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A system for detecting network intruders in real-time. In Computer Networks, volume 31, pages 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 28
    • 0037952266 scopus 로고    scopus 로고
    • Probabilistic alert correlation, in: Recent advances in intrusion detection
    • volume 2212 of Lecture Notes in Computer Science. Springer-Verlag
    • A. Valdes and K. Skinner. Probabilistic alert correlation, in: Recent advances in intrusion detection. In Recent Advances in Intrusion Detection (RAID2002), volume 2212 of Lecture Notes in Computer Science, pages 54-68. Springer-Verlag, 2001.
    • (2001) Recent Advances in Intrusion Detection (RAID2002) , pp. 54-68
    • Valdes, A.1    Skinner, K.2
  • 29
    • 84947286061 scopus 로고    scopus 로고
    • Measuring false-positive by automated real-time correlated hacking behavior analysis
    • volume 2200 of Lecture Notes in Computer Science. SpringerVerlag
    • J. Wang and I. Lee. Measuring false-positive by automated real-time correlated hacking behavior analysis. In Information Security 4th International Conference, volume 2200 of Lecture Notes in Computer Science, pages 512-. SpringerVerlag, 2001.
    • (2001) Information Security 4th International Conference , pp. 512
    • Wang, J.1    Lee, I.2
  • 30
    • 33750960602 scopus 로고
    • Analysis of audit and protocol data using methods from artificial intelligence
    • October
    • W. Weiss and A. Baur. Analysis of audit and protocol data using methods from artificial intelligence. In Proceedings of the 13th National Computer Security Conference, pages 109-114, October 1990.
    • (1990) Proceedings of the 13th National Computer Security Conference , pp. 109-114
    • Weiss, W.1    Baur, A.2
  • 31
    • 0023829320 scopus 로고
    • A formal specification and verification method for the prevention of denial of service
    • Oakland, CA USA, April. IEEE Computer Society Press
    • C.-F. Yu and V. D. Gligor. A formal specification and verification method for the prevention of denial of service. In Proceedings of 1988 IEEE Symposium on Security and Privacy, pages 187-202, Oakland, CA USA, April 1988. IEEE Computer Society Press.
    • (1988) Proceedings of 1988 IEEE Symposium on Security and Privacy , pp. 187-202
    • Yu, C.-F.1    Gligor, V.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.