메뉴 건너뛰기




Volumn 3235, Issue , 2004, Pages 359-375

A temporal logic based framework for intrusion detection

Author keywords

Intrusion detection; Runtime monitoring; Security; Temporal logic

Indexed keywords

COMPUTER CIRCUITS; MERCURY (METAL); NETWORK COMPONENTS; NETWORK SECURITY; RECONFIGURABLE HARDWARE; SPECIFICATIONS; TEMPORAL LOGIC;

EID: 35048890071     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30232-2_23     Document Type: Article
Times cited : (31)

References (22)
  • 1
    • 0003964874 scopus 로고
    • Next-generation intrusion detection expert system
    • Computer Science Laboratory, SRI International, Menlo Park, CA, May
    • D. Anderson, T. Privold, and A. Valdes. Next-generation intrusion detection expert system. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA, May 1995.
    • (1995) Technical Report SRI-CSL-95-07
    • Anderson, D.1    Privold, T.2    Valdes, A.3
  • 2
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A taxonomy and survey
    • Dept. of Computer Engineering, Chalmers University of Technology, Sweden
    • S. Axelsson. Intrusion detection systems: A taxonomy and survey. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, 2000.
    • (2000) Technical Report 99-15
    • Axelsson, S.1
  • 4
    • 84944202148 scopus 로고    scopus 로고
    • Rule-based runtime verification
    • Proceedings of 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04), Venice, Italy, January Springer-Verlag
    • H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Rule-based runtime verification. In Proceedings of 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04), Volume 2937 of Lecture Notes in Computer Science, pages 44-57, Venice, Italy, January 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.2937 , pp. 44-57
    • Barringer, H.1    Goldberg, A.2    Havelund, K.3    Sen, K.4
  • 7
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion detection systems
    • April
    • H. Debar, M. Dacier, and A. Wespi. Towards a taxonomy of intrusion detection systems. Computer Networks, 31(8):805-822, April 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 8
    • 19144362424 scopus 로고    scopus 로고
    • Monitoring Java Programs with Java PathExplorer
    • Proceedings of Runtime Verification (RV'Ol), Elsevier
    • K. Havelund and G. ROS.U. Monitoring Java Programs with Java PathExplorer. In Proceedings of Runtime Verification (RV'Ol), Volume 55 of ENTCS. Elsevier, 2001.
    • (2001) ENTCS , vol.55
    • Havelund, K.1    Rosu, G.2
  • 10
    • 0029267472 scopus 로고
    • State transition analysis: A rulebased intrusion detection approach
    • K. Ilgun, R. Kemmerer, and P. Porras. State transition analysis: A rulebased intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 11
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • May
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In IEEE Symposium on Security and Privacy, pages 175-187, May 1997.
    • (1997) IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 14
    • 0032676506 scopus 로고    scopus 로고
    • A datamining framework for building intrusion detection models
    • May
    • W. Lee. A datamining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120-132, May 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1
  • 19
    • 33749420474 scopus 로고    scopus 로고
    • Online efficient predictive safety analysis of multithreaded programs
    • Proceedings of 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), Barcelona, Spain, March
    • K. Sen, G. ROS.U, and G. Agha. Online efficient predictive safety analysis of multithreaded programs. In Proceedings of 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), Volume 2988 of LNCS, pages 123-138, Barcelona, Spain, March 2004.
    • (2004) LNCS , vol.2988 , pp. 123-138
    • Sen, K.1    Rosu, G.2    Agha, G.3
  • 21
    • 0025548907 scopus 로고
    • Security audit trail analysis using inductively generated predictive rules
    • IEEE Computer Society Press, March
    • H. Teng, K. Chen, and S. Lu. Security audit trail analysis using inductively generated predictive rules. In Conference on Artificial Intelligence Applications, pages 24-29. IEEE Computer Society Press, March 1990.
    • (1990) Conference on Artificial Intelligence Applications , pp. 24-29
    • Teng, H.1    Chen, K.2    Lu, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.