메뉴 건너뛰기




Volumn , Issue , 2003, Pages 692-705

CONFIGURATION OF INTRUSION DETECTION SYSTEMS: A COMPARISON OF DECISION AND GAME THEORETIC APPROACHES

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DECISION THEORY; INTRUSION DETECTION; LEARNING SYSTEMS; PERSONAL COMPUTING;

EID: 35048898874     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 1
    • 84928016636 scopus 로고    scopus 로고
    • The Base-Rate Fallacy and the Difficulty of Intrusion Detection
    • , pp
    • Axelsson, S. “The Base-Rate Fallacy and the Difficulty of Intrusion Detection,” ACM Transactions on Information and System Security (3:3), 2000, pp. 186-205.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 3
    • 85099376640 scopus 로고    scopus 로고
    • Security for Information Technology Service Contracts
    • CERT Coordination Center. Security for Information Technology Service Contracts, CERT Security Improvement Modules, 2001.
    • (2001) CERT Security Improvement Modules
  • 5
    • 0001936936 scopus 로고
    • Strategic Considerations in Auditing
    • October, pp
    • Fellingham, J., and Newman, P. “Strategic Considerations in Auditing,” The Accounting Review (60), October 1985, pp. 634-650.
    • (1985) The Accounting Review (60) , pp. 634-650
    • Fellingham, J.1    Newman, P.2
  • 6
    • 0034827684 scopus 로고    scopus 로고
    • Evaluation of Intrusion Detectors: A Decision Theory Approach
    • , pp
    • Gaffney, J. E., and Ulvila, J. W. “Evaluation of Intrusion Detectors: A Decision Theory Approach,” IEEE Symposium on Security and Privacy, 2001, pp. 50-61.
    • (2001) IEEE Symposium on Security and Privacy , pp. 50-61
    • Gaffney, J.E.1    Ulvila, J.W.2
  • 8
    • 0031123773 scopus 로고    scopus 로고
    • A Quantitative Model of Security Intrusion Process Based on Attacker Behavior
    • , pp
    • Jonsson, E., and Olovsson, T. “A Quantitative Model of Security Intrusion Process Based on Attacker Behavior,” IEEE Transactions on Software Engineering (23:4), 1997, pp. 235-245.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 9
    • 85138683999 scopus 로고    scopus 로고
    • Lee, W., Fan, W., Miller, M., Stolfo, S., and Zadokm E. “Toward Cost-Sensitive Modeling for Intrusion Detection and Response,” Journal of Computer Security (10:1/2), 2002, pp. 5-22.
    • Lee, W., Fan, W., Miller, M., Stolfo, S., and Zadokm E. “Toward Cost-Sensitive Modeling for Intrusion Detection and Response,” Journal of Computer Security (10:1/2), 2002, pp. 5-22.
  • 10
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA Off-Line Intrusion Detection Evaluation
    • , pp
    • Lippmann, R., Haines, J. W., Fried, D. J., Korba, J., and Das, K. “The 1999 DARPA Off-Line Intrusion Detection Evaluation,” Computer Networks (34:4), 2000, pp. 579-595.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 11
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
    • , pp
    • McHugh, J. “Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory,” ACM Transactions on Information and System Security (3:4), 2000, pp. 262-294.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 12
    • 85138710281 scopus 로고    scopus 로고
    • NMAB. Configuration Management and Performance Verification of Explosives-Detection Systems, Publication NMAB-482-3, National Academy Press, Washington, DC, 1998.
    • NMAB. Configuration Management and Performance Verification of Explosives-Detection Systems, Publication NMAB-482-3, National Academy Press, Washington, DC, 1998.
  • 13
    • 85138728288 scopus 로고    scopus 로고
    • Ortalo, R., Deswarte, Y,m and Kaaniche, M. “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security,” IEEE Transactions on Software Engineering (25:5), 1999, pp. 633-650.
    • Ortalo, R., Deswarte, Y,m and Kaaniche, M. “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security,” IEEE Transactions on Software Engineering (25:5), 1999, pp. 633-650.
  • 14
    • 0035521221 scopus 로고    scopus 로고
    • Bayesian Models for Early Warnings of Bank Failures
    • , pp
    • Sarkar, S., and Sriram, R. “Bayesian Models for Early Warnings of Bank Failures,” Management Science (47:11), 2001, pp. 1457-1475.
    • (2001) Management Science , vol.47 , Issue.11 , pp. 1457-1475
    • Sarkar, S.1    Sriram, R.2
  • 15
    • 0002438035 scopus 로고    scopus 로고
    • Estimating Campaign Benefits and Modeling Lift
    • ACM Press, New York, pp
    • Shapiro, G. P., and Masand, B. “Estimating Campaign Benefits and Modeling Lift,” in Proceedings of KDD-99, ACM Press, New York, 1999, pp. 185-193.
    • (1999) Proceedings of KDD-99 , pp. 185-193
    • Shapiro, G.P.1    Masand, B.2
  • 16
    • 1942511463 scopus 로고    scopus 로고
    • Measuring Lift Quality in Database Marketing
    • , pp
    • Shapiro, G. P., and Steingold, S. “Measuring Lift Quality in Database Marketing,” SIGKDD Explorations (2:2), 2000, pp. 81-86.
    • (2000) SIGKDD Explorations , vol.2 , Issue.2 , pp. 81-86
    • Shapiro, G.P.1    Steingold, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.