메뉴 건너뛰기




Volumn 14, Issue , 2005, Pages 1-115

Intrusion detection and correlation: Challenges and solutions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34848927600     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (47)

References (90)
  • 1
    • 0003508558 scopus 로고    scopus 로고
    • AES, National Institute of Standards and Technology, US Department of Commerce, FIPS 197
    • AES (2001). Advanced Encryption Standard. National Institute of Standards and Technology, US Department of Commerce, FIPS 197.
    • (2001) Advanced Encryption Standard
  • 3
    • 84947584994 scopus 로고    scopus 로고
    • Application-Integrated Data Collection for Security Monitoring
    • In Lee, W., Mé, L., and Wespi, A., editors, Lecture Notes in Computer Science,. Springer
    • Almgren, M. and Lindqvist, U. (2001). Application-Integrated Data Collection for Security Monitoring. In Lee, W., Mé, L., and Wespi, A., editors, Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, pages 22-36. Springer.
    • (2001) Recent Advances in Intrusion Detection (RAID) , pp. 22-36
    • Almgren, M.1    Lindqvist, U.2
  • 5
    • 0033281215 scopus 로고    scopus 로고
    • The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection
    • Axelsson, S. (1999). The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In ACM Conference on Computer and Communications Security, pages 1-7.
    • (1999) ACM Conference on Computer and Communications Security , pp. 1-7
    • Axelsson, S.1
  • 6
    • 0038223829 scopus 로고    scopus 로고
    • Technical Report NIST SP 800-31, National Institute of Standards and Technology
    • Bace, R. and Mell, P. (2001). Intrusion Detection Systems. Technical Report NIST SP 800-31, National Institute of Standards and Technology.
    • (2001) Intrusion Detection Systems
    • Bace, R.1    Mell, P.2
  • 10
    • 33748605277 scopus 로고    scopus 로고
    • Computer Security-An End State?
    • Bellovin, S. M. (2001). Computer Security-An End State? Communications of the ACM, 44(3):131-132.
    • (2001) Communications of the ACM , vol.44 , Issue.3 , pp. 131-132
    • Bellovin, S.M.1
  • 12
    • 84882586503 scopus 로고    scopus 로고
    • Bugtraq
    • Bugtraq (2004). Security mailing list. http://www.securityfocus.com.
    • (2004) Security mailing list
  • 13
    • 0034503965 scopus 로고    scopus 로고
    • Achieving scalability and expressiveness in an internet-scale event notification service
    • In, Portland OR, USA
    • Carzaniga, A., Rosenblum, D., and Wolf, A. (2000). Achieving scalability and expressiveness in an internet-scale event notification service. In ACM Symposium on Principles of Distributed Computing, pages 219-227, Portland OR, USA.
    • (2000) ACM Symposium on Principles of Distributed Computing , pp. 219-227
    • Carzaniga, A.1    Rosenblum, D.2    Wolf, A.3
  • 14
    • 84882676832 scopus 로고    scopus 로고
    • CERT
    • CERT (2003). CERT Statistics 2003. http://www.cert.org/stats/cert_stats.html.
    • (2003) CERT Statistics 2003
  • 19
    • 84867339043 scopus 로고    scopus 로고
    • Alert Correlation in a Cooperative Intrusion Detection Framework
    • In, Oakland, CA
    • Cuppens, F. and Miege, A. (2002). Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, Oakland, CA.
    • (2002) IEEE Symposium on Security and Privacy
    • Cuppens, F.1    Miege, A.2
  • 22
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • Dacier, M., Debar, H., and Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks, 31 (8):805-822.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Dacier, M.1    Debar, H.2    Wespi, A.3
  • 24
    • 0003508568 scopus 로고
    • DES, National Bureau of Standards, US Department of Commerce, FIPS 46-3
    • DES (1977). Data Encryption Standard. National Bureau of Standards, US Department of Commerce, FIPS 46-3.
    • (1977) Data Encryption Standard
  • 26
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An Attack Language for Statebased Intrusion Detection
    • Eckmann, ST., Vigna, G., and Kemmerer, R.A. (2002). STATL: An Attack Language for Statebased Intrusion Detection. Journal of Computer Security, 10(1/2):71-104.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 29
    • 85019678573 scopus 로고    scopus 로고
    • Detecting Anomalous and Unknown Intrusions Against Programs
    • In Akers, D., editors,. IEEE Computer Society
    • Ghosh, A. K., Wanken, J., and Charron, F. (1998). Detecting Anomalous and Unknown Intrusions Against Programs. In Akers, D., editor, Annual Computer Security Applications Conference (ACSAC), pages 259-267. IEEE Computer Society.
    • (1998) Annual Computer Security Applications Conference (ACSAC) , pp. 259-267
    • Ghosh, A.K.1    Wanken, J.2    Charron, F.3
  • 31
    • 85084160972 scopus 로고    scopus 로고
    • Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
    • Handley, M., Paxson, V., and Kreibich, C. (2001). Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In 10th USENIX Security Symposium.
    • (2001) 10th USENIX Security Symposium
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 32
    • 0027668428 scopus 로고
    • Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
    • Helman, P. and Liepins, G. (1993). Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. IEEE Transactions on Software Engineering, 19(9):886-901.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 35
    • 84882714215 scopus 로고    scopus 로고
    • IPSec, Protocol
    • IPSec (2004). IP Sec. Protocol, http://www.ietf.org/html.charters/ipsec-charter. html.
    • (2004) IP Sec
  • 38
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion Detection: A Brief History and Overview
    • Kemmerer, R. A. and Vigna, G. (2002). Intrusion Detection: A Brief History and Overview. IEEE Computer, 35(4):27-30.
    • (2002) IEEE Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 39
    • 0030677523 scopus 로고    scopus 로고
    • Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach
    • Ko, C., Ruschitzka, M., and Levitt, K. (1997). Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In IEEE Symposium on Security and Privacy, pages 175-187.
    • (1997) IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 44
    • 0017996760 scopus 로고
    • Time, Clocks and the Ordering of Events in a Distributed System
    • Lamport, L. (1978). Time, Clocks and the Ordering of Events in a Distributed System. Communications of the ACM, 21(7):558-65.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 47
    • 0032630098 scopus 로고    scopus 로고
    • Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)
    • In, Oakland, California. IEEE Computer Society Press, Los Alamitos, California
    • Lindqvist, U. and Porras, P. A. (1999). Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California. IEEE Computer Society Press, Los Alamitos, California.
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 51
    • 0033890508 scopus 로고    scopus 로고
    • Transport and Application Protocol Scrubbing
    • Malan, G. R., Watson, D., Jahanian, F., and Howell, P. (2000). Transport and Application Protocol Scrubbing. In INFOCOM(3), pages 1381-1390.
    • (2000) INFOCOM(3) , pp. 1381-1390
    • Malan, G.R.1    Watson, D.2    Jahanian, F.3    Howell, P.4
  • 52
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
    • McHugh, J. (2000). Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4):262-294.
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 53
    • 0003993827 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory
    • MIT Lincoln Laboratory (2000). DARPA Intrusion Detection Evaluation. http://www.ll. mit.edu/IST/ideval/.
    • (2000) DARPA Intrusion Detection Evaluation
  • 56
    • 84903593793 scopus 로고    scopus 로고
    • An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems
    • In, Las Vegas, Nevada
    • Mutz, D., Vigna, G., and Kemmerer, R. A. (2003). An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. In Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada.
    • (2003) Annual Computer Security Applications Conference (ACSAC)
    • Mutz, D.1    Vigna, G.2    Kemmerer, R.A.3
  • 61
    • 14844302515 scopus 로고    scopus 로고
    • A High-level Programming Environment for Packet Trace Anonymization and Transformation
    • Pang, R. and Paxson, V. (2003). A High-level Programming Environment for Packet Trace Anonymization and Transformation. In ACM SIGCOMM.
    • (2003) ACM SIGCOMM
    • Pang, R.1    Paxson, V.2
  • 67
    • 84882674219 scopus 로고    scopus 로고
    • Intrusion Detection and Network Forensics
    • In, Denver, Colorado, USA
    • Ranum, M. (2000). Intrusion Detection and Network Forensics. In M1 Tutorial-USENIX Security 2000, Denver, Colorado, USA.
    • (2000) M1 Tutorial-USENIX Security 2000
    • Ranum, M.1
  • 68
    • 84962435308 scopus 로고    scopus 로고
    • Security holes. Who cares?
    • In Paxson, V., editors, USENIX
    • Rescorla, E. (2003). Security holes. Who cares? In Paxson, V., editor, USENIX Security Symposium, pages 75-90. USENIX.
    • (2003) USENIX Security Symposium , pp. 75-90
    • Rescorla, E.1
  • 69
    • 0017930809 scopus 로고
    • A Method for obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R. L., Shamir, A., and Adleman, L. A. (1978). A Method for obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2): 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 70
    • 85090433665 scopus 로고    scopus 로고
    • Snort-Lightweight Intrusion Detection for Networks
    • In Parter, D., editors,. USENIX
    • Roesch, M. (1999). Snort-Lightweight Intrusion Detection for Networks. In Parter, D., editor, Large Installation System Administraton (LISA), pages 229-238. USENIX.
    • (1999) Large Installation System Administraton (LISA) , pp. 229-238
    • Roesch, M.1
  • 71
    • 0003855464 scopus 로고    scopus 로고
    • John Wiley & Sons, Inc., New York, USA, 2nd edition
    • Schneier, Bruce (1996). Applied Cryptography. John Wiley & Sons, Inc., New York, USA, 2nd edition.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 74
    • 84882596505 scopus 로고    scopus 로고
    • Snot
    • Snot (2004). A packet generator. http://www.stolenshoes.net/sniph/.
    • (2004) A packet generator
  • 78
    • 84882638196 scopus 로고    scopus 로고
    • Stick
    • Stick (2004). IDS stress tool, http://www.eurocompton.net/stick/projects8.html.
    • (2004) IDS stress tool
  • 80
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
    • In Wespi, A., Vigna, G., and Deri, L., editors, Lecture Notes in Computer Science,. Springer
    • Tan, K. M. C., Killourhy, K. S., and Maxion, R. A. (2002). Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. In Wespi, A., Vigna, G., and Deri, L., editors, Recent Advances in Intrusion Detection (RAID), Lecture Notes in Computer Science, pages 54-73. Springer.
    • (2002) Recent Advances in Intrusion Detection (RAID) , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 81
    • 0036085540 scopus 로고    scopus 로고
    • Why 6? Defining the Operational Limits of Slide, an Anomaly-Based Intrusion Detector
    • Tan, K. M. C. and Maxion, R. A. (2002). Why 6? Defining the Operational Limits of Slide, an Anomaly-Based Intrusion Detector. In IEEE Symposium on Security and Privacy, pages 188-201.
    • (2002) IEEE Symposium on Security and Privacy , pp. 188-201
    • Tan, K.M.C.1    Maxion, R.A.2
  • 88
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating Security Managers: A peer-based intrusion detection system
    • White, Gregory B., Fisch, Eric A., and Pooch, Udo W. (1996). Cooperating Security Managers: A peer-based intrusion detection system. IEEE Network, pages 20-23.
    • (1996) IEEE Network , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3
  • 89
    • 0007919024 scopus 로고    scopus 로고
    • x509, The Internet Engineering Task Force
    • x509 (2002). Public-Key Infrastructure X.509. The Internet Engineering Task Force.
    • (2002) Public-Key Infrastructure X.509


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.