메뉴 건너뛰기




Volumn 4, Issue 6, 2006, Pages 36-43

Network intrusion detection: Automated and manual methods prone to attack and evasion

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; RISK ASSESSMENT; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 33845524232     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2006.159     Document Type: Article
Times cited : (27)

References (16)
  • 1
    • 33845516367 scopus 로고    scopus 로고
    • Intrusion detection techniques
    • H. Bidgoli, ed., Wiley & Sons
    • P. Ning and S. Jajodia, "Intrusion Detection Techniques," The Internet Encyclopedia, H. Bidgoli, ed., Wiley & Sons, 2003, pp. 2-6.
    • (2003) The Internet Encyclopedia , pp. 2-6
    • Ning, P.1    Jajodia, S.2
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • tech. report CMU/SEI-99-TR-028, Carnegie Mellon Univ. Software Eng. Inst.
    • J. Allen et al., State of the Practice of Intrusion Detection Technologies, tech. report CMU/SEI-99-TR-028, Carnegie Mellon Univ. Software Eng. Inst., 2000, pp. 37-60; www.sei.cmu.edu/pub/documents/99.reports/pdf/ 99tr028.pdf.
    • (2000) State of the Practice of Intrusion Detection Technologies , pp. 37-60
    • Allen, J.1
  • 4
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Usenix Assoc.
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. 7th Ann. Usenix Security Symp. (Security 98), Usenix Assoc., 1998, pp. 12-15.
    • (1998) Proc. 7th Ann. Usenix Security Symp. (Security 98) , pp. 12-15
    • Paxson, V.1
  • 6
    • 85139020324 scopus 로고    scopus 로고
    • The work of intrusion detection: Rethinking the role of security analysts
    • Nicolas C. Romano, ed., Assoc. for Information Systems
    • J. Goodall, W. Lutters, and A. Komlodi, 'The Work of Intrusion Detection: Rethinking the Role of Security Analysts," Proc. 10th Americas Conf. Information Systems (AMCIS 04), Nicolas C. Romano, ed., Assoc. for Information Systems, 2004, pp. 1421-1427.
    • (2004) Proc. 10th Americas Conf. Information Systems (AMCIS 04) , pp. 1421-1427
    • Goodall, J.1    Lutters, W.2    Komlodi, A.3
  • 8
    • 84903593793 scopus 로고    scopus 로고
    • An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
    • IEEE CS Press
    • D. Mute, G. Vigna, and R. Kemmerer, "An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems," Proc. 19th Ann. Computer Security Applications Conf. (ACSAC 03), IEEE CS Press, 2003, pp. 2-7.
    • (2003) Proc. 19th Ann. Computer Security Applications Conf. (ACSAC 03) , pp. 2-7
    • Mute, D.1    Vigna, G.2    Kemmerer, R.3
  • 9
    • 4544230873 scopus 로고    scopus 로고
    • Hiding intrusions: From the abnormal to the normal and beyond
    • LNCS 2578, Springer-Verlag
    • K. Tan, J. McHugh, and K. Killourhy, "Hiding Intrusions: From the Abnormal to the Normal and Beyond," Proc. 5th Int'l Workshop on Information Hiding, LNCS 2578, Springer-Verlag, 2002, pp. 10-16.
    • (2002) Proc. 5th Int'l Workshop on Information Hiding , pp. 10-16
    • Tan, K.1    Mchugh, J.2    Killourhy, K.3
  • 11
  • 14
    • 33644565261 scopus 로고    scopus 로고
    • Polymorphic shellcode engine using spectrum analysis
    • Aug.
    • T. Detristan et al., "Polymorphic Shellcode Engine Using Spectrum Analysis," Phrack, vol. 11, no. 61, Aug. 2003; www.trust-us.ch/phrack/show. php.
    • (2003) Phrack , vol.11 , Issue.61
    • Detristan, T.1
  • 16
    • 84860044547 scopus 로고    scopus 로고
    • History and advances in windows shell code
    • July
    • S.K. Chong, "History and Advances in Windows Shell code," Phrack, vol. 11, no. 62, July 2004; www.trust-us.ch/phrack/show.php.
    • (2004) Phrack , vol.11 , Issue.62
    • Chong, S.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.