메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 59-71

Exploiting independent state for network intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED PROCESSING; NETWORK INTRUSION DETECTION SYSTEMS (NIDSS); VOLATILE PROCESSOR MEMORY;

EID: 33846281935     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.24     Document Type: Conference Paper
Times cited : (20)

References (28)
  • 2
    • 0033281215 scopus 로고    scopus 로고
    • The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection
    • S. Axelsson. The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In ACM Conference on Computer and Communications Security, pages 1-7, 1999.
    • (1999) ACM Conference on Computer and Communications Security , pp. 1-7
    • Axelsson, S.1
  • 3
    • 33846288543 scopus 로고    scopus 로고
    • CERT Advisory CA-2003-20 W32/Blaster worm. http://www.cert.org/ advisories/CA-2003-20.html.
    • CERT Advisory CA-2003-20 W32/Blaster worm. http://www.cert.org/ advisories/CA-2003-20.html.
  • 6
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and Correlation of Intrusion-Detection Alerts
    • Proc. Recent Advances in Intrusion Detection, number in
    • H. Debar and A. Wespi. Aggregation and Correlation of Intrusion-Detection Alerts. In Proc. Recent Advances in Intrusion Detection, number 2212 in Lecture Notes in Computer Science. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science. Springer-Verlag , vol.2212
    • Debar, H.1    Wespi, A.2
  • 10
    • 3142623031 scopus 로고    scopus 로고
    • Clustering Intrusion Detection Alarms to Support Root Cause Analysis
    • K. Julisch. Clustering Intrusion Detection Alarms to Support Root Cause Analysis. ACM Transactions on Information and System Security, 6(4):443-471, 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 13
    • 84949978826 scopus 로고    scopus 로고
    • Decentralized Event Correlation for Intrusion Detection
    • Proc. Information Security and Cryptology, of
    • C. Krügel, T. Toth, and C. Kerer. Decentralized Event Correlation for Intrusion Detection. In Proc. Information Security and Cryptology, volume 2288 of Lecture Notes in Computer Science, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2288
    • Krügel, C.1    Toth, T.2    Kerer, C.3
  • 15
    • 33846313076 scopus 로고    scopus 로고
    • OpenSSL
    • OpenSSL. http://www.openssl.org.
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • 31(23-24):2435-2463
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
    • (1999) Computer Networks
    • Paxson, V.1
  • 17
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore, MD, October
    • P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In National Information Systems Security Conference, Baltimore, MD, October 1997.
    • (1997) National Information Systems Security Conference
    • Porras, P.A.1    Neumann, P.G.2
  • 18
    • 0002473030 scopus 로고
    • DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an Early Prototype
    • Snapp, S., et al. DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an Early Prototype. In Proc. 14th NIST-NCSC National Computer Security Conference, 1991.
    • (1991) Proc. 14th NIST-NCSC National Computer Security Conference
    • Snapp, S.1
  • 22
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion Detection Using Autonomous Agents
    • E. H. Spafford and D. Zamboni. Intrusion Detection Using Autonomous Agents. Computer Networks, 34(4):547-570, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 25
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic Alert Correlation
    • Proc. Recent Advances in Intrusion Detection, number in
    • A. Valdes and K. Skinner. Probabilistic Alert Correlation. In Proc. Recent Advances in Intrusion Detection, number 2212 in Lecture Notes in Computer Science. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science. Springer-Verlag , vol.2212
    • Valdes, A.1    Skinner, K.2
  • 26
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A Network-based Intrusion Detection System
    • G. Vigna and R. A. Kemmerer. NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security, 7(1):37-71, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 27
    • 84947584002 scopus 로고    scopus 로고
    • Designing a Web of Highly-Configurable Intrusion Detection Sensors
    • Proc. Recent Advances in Intrusion Detection, number in
    • G. Vigna, R. A. Kemmerer, and P. Blix. Designing a Web of Highly-Configurable Intrusion Detection Sensors. In Proc. Recent Advances in Intrusion Detection, number 2212 in Lecture Notes in Computer Science, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2212
    • Vigna, G.1    Kemmerer, R.A.2    Blix, P.3
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.