메뉴 건너뛰기




Volumn 2007, Issue , 2007, Pages 283-287

Investigating new approaches to data collection, management and analysis for network intrusion detection

Author keywords

Data collection and analysis; Data fusion; Data mining; Mobile sensors; Network intrusion detection systems; Wireless networks

Indexed keywords

DATA COLLECTION AND ANALYSIS; INTRUSION DATA; LINUX DEVICES; NETWORK INTRUSION DETECTION SYSTEMS;

EID: 34248347086     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1233341.1233392     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 2
    • 34248350691 scopus 로고    scopus 로고
    • Anderson, J. P. Computer Security Threat Monitoring and Surveillance. Technical Report Contract 79F296400, James P. Anderson Co., Box 42, Fort Washington, PA, 1980.
    • Anderson, J. P. Computer Security Threat Monitoring and Surveillance. Technical Report Contract 79F296400, James P. Anderson Co., Box 42, Fort Washington, PA, 1980.
  • 5
    • 0038223829 scopus 로고    scopus 로고
    • Intrusion Detection Systems
    • 800-31, National Institute of Standards and Technology, Gaithersburg, MD, Accessed at
    • Bace, R. and Mell, P. Intrusion Detection Systems. NIST Special Report 800-31, National Institute of Standards and Technology, Gaithersburg, MD, 2001, Accessed at http://cnscenter.future.co.kr/resource/crypto/standard/ fips/sp 800-31.pdf.
    • (2001) NIST Special Report
    • Bace, R.1    Mell, P.2
  • 6
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multi-sensor data fusion
    • Bass, T. Intrusion detection systems and multi-sensor data fusion. Communications of the ACM, 43, 4 (2000), 99-105.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 8
    • 34248348622 scopus 로고    scopus 로고
    • Gumstix, Inc, Accessed at
    • Gumstix, Inc. Gumstix Support Wiki. Accessed at http://docwiki.gumstix.org/Main_Page.
    • Gumstix Support Wiki
  • 9
    • 58049121411 scopus 로고    scopus 로고
    • Gumstix, Inc, Accessed at
    • Gumstix, Inc. Gumstix - Way small computing. Accessed at http://gumstix.com/index.html.
    • Gumstix - Way small computing
  • 10
    • 34248400701 scopus 로고    scopus 로고
    • US Department of Homeland Security Strategic Plan. U.S. Government, Washington, DC, Accessed at
    • Homeland Security, Department of. US Department of Homeland Security Strategic Plan. U.S. Government, Washington, DC, 2004, Accessed at http://www.dhs.gov/xlibrary/assets/DHS_StratPlan_FINAL_ spread.pdf.
    • (2004) Homeland Security, Department of
  • 11
    • 34248399912 scopus 로고    scopus 로고
    • Homeland Security, Department of. The National Strategy to Secure Cyberspace. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf.
    • Homeland Security, Department of. The National Strategy to Secure Cyberspace. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf.
  • 12
    • 34248330309 scopus 로고    scopus 로고
    • Homeland Security, Department of. The National. Strategy for the Physical Protection of Critical Infrastructures and Key Assets. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/ assets/Physical Strategy.pdf.
    • Homeland Security, Department of. The National. Strategy for the Physical Protection of Critical Infrastructures and Key Assets. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/ assets/Physical Strategy.pdf.
  • 13
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • Apr
    • Klemmerer, R.A. and Vigna, G. Intrusion detection: a brief history and overview. IEEE Computer, 35, 4 (Apr. 2002), 27-30.
    • (2002) IEEE Computer , vol.35 , Issue.4 , pp. 27-30
    • Klemmerer, R.A.1    Vigna, G.2
  • 15
    • 0003993827 scopus 로고    scopus 로고
    • Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA, Accessed at
    • Lincoln Laboratory. 1999 DARPA Intrusion Detection Evaluation Plan. Massachusetts Institute of Technology, Lexington, MA, 1999, Accessed at http://www.ll.mit.edu/IST/ideval/docs/1999/id99-eval-ll.html.
    • (1999) 1999 DARPA Intrusion Detection Evaluation Plan
  • 17
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt, T. F. A survey of intrusion detection techniques. Computers and Security, 12 (1993), 405-418.
    • (1993) Computers and Security , vol.12 , pp. 405-418
    • Lunt, T.F.1
  • 18
    • 34248375550 scopus 로고    scopus 로고
    • SANS.org. Intrusion Detection FAQ. Accessed at http://www.sans.org/resources/idfaq/.
    • SANS.org. Intrusion Detection FAQ. Accessed at http://www.sans.org/resources/idfaq/.
  • 19
    • 0007473204 scopus 로고    scopus 로고
    • An introduction to intrusion detection
    • Apr, Accessed at
    • Sundaram, A. An introduction to intrusion detection. Crossroads: The ACM Student Magazine, 2, 4 (Apr.1996), Accessed at http://www.acm.org/ crossroads/xrds2-4/intrus.html.
    • (1996) Crossroads: The ACM Student Magazine , vol.2 , pp. 4
    • Sundaram, A.1
  • 22
    • 34248390054 scopus 로고    scopus 로고
    • TwoCrows.com. Data Mining Glossary. Accessed at http://www.twocrows.com/glossary.htm.
    • TwoCrows.com. Data Mining Glossary. Accessed at http://www.twocrows.com/glossary.htm.
  • 23
    • 34248326791 scopus 로고    scopus 로고
    • Wi-Fi Alliance, WPA2 (WiFi Protected Access 2). Accessed at http://www.wi-fi.org/knowledge_center/wpa2/.
    • Wi-Fi Alliance, WPA2 (WiFi Protected Access 2). Accessed at http://www.wi-fi.org/knowledge_center/wpa2/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.