메뉴 건너뛰기




Volumn 3252, Issue , 2004, Pages 458-465

A sequential pattern mining algorithm for misuse intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; COMPUTATIONAL COMPLEXITY; DATA MINING; DIGITAL STORAGE; INTRUSION DETECTION; MERCURY (METAL); NETWORK LAYERS; NETWORK SECURITY; SECURITY OF DATA;

EID: 35048885636     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30207-0_57     Document Type: Article
Times cited : (3)

References (8)
  • 1
    • 0032178152 scopus 로고    scopus 로고
    • An extensible probe architecture for network protocol performance measurement
    • Vancouver, British Columbia, Canada
    • G. R. Malan and F. Jahanian. An extensible probe architecture for network protocol performance measurement. In Proceedings of SIGCOMM, Vancouver, British Columbia, Canada, 1998,215-227.
    • (1998) Proceedings of SIGCOMM , pp. 215-227
    • Malan, G.R.1    Jahanian, F.2
  • 2
    • 0033295259 scopus 로고    scopus 로고
    • A system for detecting network intruders in real-time
    • VernPaxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 1999, 31(23-24), 2435-2463.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Bro, V.1
  • 4
    • 35048879829 scopus 로고    scopus 로고
    • LIAN Yi-Feng, Research of Distributing intrusion detection system, [D]In University of Science and Technology of China, China, May 2002
    • LIAN Yi-Feng, Research of Distributing intrusion detection system, [D]In University of Science and Technology of China, China, May 2002.
  • 6
    • 0242540443 scopus 로고    scopus 로고
    • Sequential pattern mining using a bitmap representation
    • J. Ayres, J. Flannick, J. Gehrke, and T. Yiu. Sequential pattern mining using a bitmap representation. In SIGKDD, 2002, p429-435.
    • (2002) SIGKDD , pp. 429-435
    • Ayres, J.1    Flannick, J.2    Gehrke, J.3    Yiu, T.4
  • 7
    • 35048814647 scopus 로고    scopus 로고
    • DARPA Intrusion Detection Evaluation
    • DARPA Intrusion Detection Evaluation http://www.ll.mit.edu/IST/ideval/.
  • 8
    • 35048864989 scopus 로고    scopus 로고
    • The Research and Implementation on the Network Behavior Monitor System Based on the General Finite States Machine
    • National University of Defense Technology, China, May
    • WEN Yan, The Research and Implementation on The Network Behavior Monitor System Based on The General Finite States Machine, [D] In Paper of the degree of Master in School of Computer Science, National University of Defense Technology, China, May 2004.
    • (2004) [D]Paper of the Degree of Master in School of Computer Science
    • Yan, W.E.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.