메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 64-74

Formal specication of intrusion signatures and detection rules

Author keywords

Algorithm design and analysis; Computer security; Data structures; Detection algorithms; Expert systems; Intrusion detection; Knowledge based systems; Pattern matching; Petri nets; Writing

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; DATA STRUCTURES; EXPERT SYSTEMS; FORMAL LANGUAGES; KNOWLEDGE BASED SYSTEMS; MERCURY (METAL); NETWORK SECURITY; PATTERN MATCHING; PETRI NETS; SECURITY OF DATA; SECURITY SYSTEMS; SIGNAL DETECTION; TECHNICAL WRITING;

EID: 33847105800     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2002.1021807     Document Type: Conference Paper
Times cited : (13)

References (18)
  • 2
    • 84948827139 scopus 로고    scopus 로고
    • CVE-1999-0442
    • Common Vulnerabilities and Exposures (CVE). CVE-1999-0442. http://cve.mitre.org.
  • 3
    • 84947551869 scopus 로고    scopus 로고
    • Mémoire pour obtention du grade de Licencié en Informatique - Faculté Universitaire Notre-Dame de la Paix, Namur, Belgium
    • F. Gérard. Définition et implémentation d'un langage d'analyse d'audittrails. Mémoire pour obtention du grade de Licencié en Informatique - Faculté Universitaire Notre-Dame de la Paix, Namur, Belgium - http://www.info.fundp.ac.be/~vle/asax/publications.html, 1998.
    • (1998) Définition et Implémentation d'Un Langage d'Analyse d'Audittrails
    • Gérard, F.1
  • 7
    • 0031640906 scopus 로고    scopus 로고
    • Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies
    • IEEE Computer Society Press
    • J.-L. Lin, X. S. Wang, and S. Jajodia. Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. In Proc. of the 11th Computer Security Foundations Workshop. IEEE Computer Society Press, 1998.
    • (1998) Proc. of the 11th Computer Security Foundations Workshop
    • Lin, J.-L.1    Wang, X.S.2    Jajodia, S.3
  • 10
    • 0005977876 scopus 로고    scopus 로고
    • From declarative signatures to misuse ids
    • W. Lee, L. Mé, and A. Wespi, editors, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, Springer-Verlag
    • J.-P. Pouzol and M. Ducassé. From declarative signatures to misuse ids. In W. Lee, L. Mé, and A. Wespi, editors, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, volume 2212 of LNCS. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2212
    • Pouzol, J.-P.1    Ducassé, M.2
  • 14
    • 0040638004 scopus 로고
    • PhD thesis, University of Twente, Enschede, the Netherlands
    • K. Sikkel. Parsing Schemata. PhD thesis, University of Twente, Enschede, the Netherlands, 1993.
    • (1993) Parsing Schemata
    • Sikkel, K.1
  • 15
    • 0002525206 scopus 로고    scopus 로고
    • Parsing of Context Free Languages
    • G.Rozenberg and A. Salomaa, editors, Springer-Verlag
    • K. Sikkel and A. Nijholt. Parsing of Context Free Languages. In G.Rozenberg and A. Salomaa, editors, Handbook of Formal Languages, volume 2. Springer-Verlag, 1996.
    • (1996) Handbook of Formal Languages , vol.2
    • Sikkel, K.1    Nijholt, A.2
  • 17
    • 2942751146 scopus 로고    scopus 로고
    • Experiences with Specification-Based Intrusion Detection
    • W. Lee, L. Mé, and A. Wespi, editors, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID), Springer-Verlag
    • P. Uppuluri and R. Sekkar. Experiences with Specification-Based Intrusion Detection. In W. Lee, L. Mé, and A. Wespi, editors, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID), volume 2212 of LNCS. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2212
    • Uppuluri, P.1    Sekkar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.