메뉴 건너뛰기




Volumn 2845, Issue , 2003, Pages 158-178

An architecture for an adaptive intrusion-tolerant server

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 35048865426     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (19)

References (33)
  • 1
    • 84947584994 scopus 로고    scopus 로고
    • Application-integrated data collection for security monitoring
    • Recent Advances in Intrusion Detection (RAID 2001), Springer-Verlag, Oct.
    • M. Almgren and U. Lindqvist. Application-integrated data collection for security monitoring. In Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 22-36. Springer-Verlag, Oct. 2001.
    • (2001) LNCS , vol.2212 , pp. 22-36
    • Almgren, M.1    Lindqvist, U.2
  • 8
    • 0031674242 scopus 로고    scopus 로고
    • A metaobject architecture for fault-tolerant distributed systems: The FRIENDS approach
    • Jan.
    • J.-C. Fabre and T. Pérennou. A metaobject architecture for fault-tolerant distributed systems: The FRIENDS approach. IEEE Transactions on Computers, 47:78-95, Jan. 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , pp. 78-95
    • Fabre, J.-C.1    Pérennou, T.2
  • 11
  • 14
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
    • IEEE press, May
    • U. Lindqvist and P. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161. IEEE press, May 1999.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.2
  • 16
    • 0034829988 scopus 로고    scopus 로고
    • Multi-phase damage confinement in database systems for intrusion tolerance
    • June
    • P. Liu and S. Jajodia. Multi-phase damage confinement in database systems for intrusion tolerance. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 191-205, June 2001.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 191-205
    • Liu, P.1    Jajodia, S.2
  • 17
    • 0038289958 scopus 로고    scopus 로고
    • Security Advisory AL20010717, eEye Digital Security, July
    • R. Permeh and M. Maiffret. .ida "Code Red" worm. Security Advisory AL20010717, eEye Digital Security, July 2001. http://www.eeye.com/html/ Research/Advisories/AL20010717.html.
    • (2001) Ida "Code Red" Worm
    • Permeh, R.1    Maiffret, M.2
  • 18
    • 35048813234 scopus 로고    scopus 로고
    • Personal communication, SRI International
    • P. Porras. Mission-based correlation. Personal communication, SRI International, 2001. http://www.sdl.sri.com/projects/M-correlation.
    • (2001) Mission-based Correlation
    • Porras, P.1
  • 19
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
    • Oct.
    • P. Porras and P. Neumann. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In National Information Security Conference, Oct. 1997.
    • (1997) National Information Security Conference
    • Porras, P.1    Neumann, P.2
  • 26
    • 1642293015 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • Nov.
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In USENIX LISA'99, Nov. 1999. www.snort.org.
    • (1999) USENIX LISA'99
    • Roesch, M.1
  • 30
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic alert correlation
    • Recent Advances in Intrusion Detection (RAID 2001), Springer-Verlag, Oct.
    • A. Valdes and K. Skinner. Probabilistic alert correlation. In Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 54-68. Springer-Verlag, Oct. 2001.
    • (2001) LNCS , vol.2212 , pp. 54-68
    • Valdes, A.1    Skinner, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.