메뉴 건너뛰기




Volumn 6, Issue 5, 2007, Pages 345-357

Integrating software specifications into intrusion detection

Author keywords

Attack scenarios; Intrusion detection; Software specification languages; State machines

Indexed keywords

COMPUTER CRIME; COMPUTER PRIVACY; COMPUTER PROGRAMMING LANGUAGES; INTRUSION DETECTION; SECURITY OF DATA; UNIFIED MODELING LANGUAGE;

EID: 34548131684     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-007-0023-0     Document Type: Conference Paper
Times cited : (9)

References (33)
  • 3
    • 33644932227 scopus 로고    scopus 로고
    • Model-based testing with AsmL.NET
    • Technical report, Microsoft Research, Redmond, WA, USA
    • Barnett, M., Grieskamp, W., Nachmanson, L., Schulte, W., Tillmann, N., Veanes, M.: Model-based testing with AsmL.NET. Technical report, Microsoft Research, Redmond, WA, USA (2003)
    • (2003)
    • Barnett, M.1    Grieskamp, W.2    Nachmanson, L.3    Schulte, W.4    Tillmann, N.5    Veanes, M.6
  • 4
    • 0002063138 scopus 로고    scopus 로고
    • Automatic generation of functional vectors using the extended finite state machine model
    • Cheng K.T. and Krishnakumar A.S. (1996). Automatic generation of functional vectors using the extended finite state machine model. ACM Trans. Design Autom. Elec. Syst. 1(1): 57-79
    • (1996) ACM Trans. Design Autom. Elec. Syst. , vol.1 , Issue.1 , pp. 57-79
    • Cheng, K.T.1    Krishnakumar, A.S.2
  • 7
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • Eckmann S., Vigna G. and Kemmerer R. (2002). STATL: An attack language for state-based intrusion detection. J. Comput. Sec. 10: 71-104
    • (2002) J. Comput. Sec. , vol.10 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 11
    • 34548183566 scopus 로고    scopus 로고
    • Towards a UML profile for model-based risk assessment
    • In: Dresden, Germany, LNCS
    • Houmb, S., den Braber, F., Lund, M.S., Stolen, K.: Towards a UML profile for model-based risk assessment. In: Proceedings of the UML 2002, Dresden, Germany, LNCS vol. 2460, pp. 79-92 (2002)
    • (2002) Proceedings of the UML 2002 , vol.2460 , pp. 79-92
    • Houmb, S.1    den Braber, F.2    Lund, M.S.3    Stolen, K.4
  • 13
    • 33847617890 scopus 로고    scopus 로고
    • Intrusion detection aware component-based systems: A specification-based approach
    • Hussein M. and Zulkernine M. (2007). Intrusion detection aware component-based systems: A specification-based approach. J. Syst. Softw. 80(5): 700-710
    • (2007) J. Syst. Softw. , vol.80 , Issue.5 , pp. 700-710
    • Hussein, M.1    Zulkernine, M.2
  • 14
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • In: Dresden, Germany. LNCS
    • JuEdie;rjens, J.: UMLsec: extending UML for secure systems development. In: Proceedings of the UML 2002, Dresden, Germany. LNCS vol. 2460, pp. 412-425 (2002)
    • (2002) Proceedings of the UML 2002 , vol.2460 , pp. 412-425
    • Jüjens, J.1
  • 15
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • In: Dresden, Germany. LNCS
    • LoddeAstedt, T., Basin, D.A., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: Proceedings of the UML 2002, Dresden, Germany. LNCS vol. 2460, pp. 426-441 (2002)
    • (2002) Proceedings of the UML 2002 , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.A.2    Doser, J.3
  • 18
    • 34548135331 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory (Online). Available: Last accessed in January
    • MIT Lincoln Laboratory, DARPA Intrusion Detection Data Sets (Online). Available: http://www.ll.mit.edu/IST/ideval/data/data_index.html. Last accessed in January 2007
    • (2007) DARPA Intrusion Detection Data Sets
  • 19
    • 34548138040 scopus 로고    scopus 로고
    • Object Management Group: UML profile for modeling quality of service and fault tolerance characteristics and mechanisms
    • Technical report
    • Object Management Group: UML profile for modeling quality of service and fault tolerance characteristics and mechanisms. Technical report (2004)
    • (2004)
  • 20
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson V. (1999). Bro: A system for detecting network intruders in real-time. Comput. Netw. 31(23-24): 2435-2463
    • (1999) Comput. Netw. , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 21
    • 34548143531 scopus 로고    scopus 로고
    • Evaluating the viability of intrusion detection system benchmarking
    • Bachelor's Thesis, University of Virginia, VA, USA
    • Pickering, K.J.: Evaluating the viability of intrusion detection system benchmarking. Bachelor's Thesis, University of Virginia, VA, USA (2002)
    • (2002)
    • Pickering, K.J.1
  • 24
  • 26
    • 2342479360 scopus 로고    scopus 로고
    • (Online). Available: Last accessed in January
    • Snort Users Manual (Online). Available: http://snort.org/. Last accessed in January 2007
    • (2007) Snort Users Manual
  • 27
    • 33750267521 scopus 로고    scopus 로고
    • Last Accessed in January 2007
    • The Abstract State Machine Language. http://research.microsoft.com/fse/ asml/. Last Accessed in January 2007
    • The Abstract State Machine Language
  • 28
    • 34548132905 scopus 로고    scopus 로고
    • Website: Last accessed in January
    • The Object Management Group. Website: http://www.omg.org. Last accessed in January 2007
    • (2007) The Object Management Group
  • 29
    • 0003683075 scopus 로고    scopus 로고
    • Website: Last accessed in January
    • TheHUnified Modeling Language: Website: http://www.uml.org. Last accessed in January 2007
    • (2007) The Unified Modeling Language
  • 31
    • 33645588003 scopus 로고    scopus 로고
    • ASL: A specification language for intrusion detection and network monitoring
    • Master's thesis, Iowa State University, IA, USA
    • AVankamamidi, R.: ASL: a specification language for intrusion detection and network monitoring. Master's thesis, Iowa State University, IA, USA (1998)
    • (1998)
    • Vankamamidi, R.1
  • 32
    • 0006890005 scopus 로고    scopus 로고
    • The development and analysis of intrusion detection algorithms
    • Master's thesis, Massachusetts Institute of Technology, MA, USA
    • Webster, S.: The development and analysis of intrusion detection algorithms. Master's thesis, Massachusetts Institute of Technology, MA, USA (1998)
    • (1998)
    • Webster, S.1
  • 33
    • 52249097319 scopus 로고    scopus 로고
    • National Research Council Canada NR C/ERB-1134, NRC 48478
    • Yee, G.: Recent research in secure software. National Research Council Canada NR C/ERB-1134, NRC 48478 (2006)
    • (2006) Recent Research in Secure Software
    • Yee, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.