메뉴 건너뛰기




Volumn 4637 LNCS, Issue , 2007, Pages 146-166

ELICIT: A system for detecting insiders who violate need-to-know

Author keywords

Anomaly detection; Insider threat; Misuse

Indexed keywords

CASE BASED REASONING; DATA ACQUISITION; DECISION THEORY;

EID: 38349036494     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74320-0_8     Document Type: Conference Paper
Times cited : (88)

References (19)
  • 1
    • 38349037768 scopus 로고    scopus 로고
    • United States v. Leandro Aragoncillo and Michael Ray Aquino: Criminal complaint. District of New Jersey (September 9, 2005)
    • United States v. Leandro Aragoncillo and Michael Ray Aquino: Criminal complaint. District of New Jersey (September 9, 2005)
  • 2
    • 27844543023 scopus 로고    scopus 로고
    • Insider threat study: Computer system sabotage in critical infrastructure sector
    • Technical report, US Secret Service and CERT Program, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA May
    • Keeney, M., et al.: Insider threat study: Computer system sabotage in critical infrastructure sector. Technical report, US Secret Service and CERT Program, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (May 2005)
    • (2005)
    • Keeney, M.1
  • 3
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3(4), 227-261 (2000)
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 4
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • National Institute of Standards and Technology, Gaithersburg, MD
    • Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th NIST-NCSC National Information Systems Security Conference, pp. 353-365. National Institute of Standards and Technology, Gaithersburg, MD (1997)
    • (1997) Proceedings of the 20th NIST-NCSC National Information Systems Security Conference , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 7
    • 38349038686 scopus 로고    scopus 로고
    • Ethereal, Inc.: Ethereal. Software (2007), http://www.ethereal.com
    • Ethereal, Inc.: Ethereal. Software (2007), http://www.ethereal.com
  • 10
    • 0003448310 scopus 로고    scopus 로고
    • Statistics for Engineering and Information Science. Springer, New York, NY
    • Jensen, F.V.: Bayesian networks and decision graphs. Statistics for Engineering and Information Science. Springer, New York, NY (2001)
    • (2001) Bayesian networks and decision graphs
    • Jensen, F.V.1
  • 11
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Lippmann, R., et al.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34, 579-595 (2000)
    • (2000) Computer Networks , vol.34 , pp. 579-595
    • Lippmann, R.1
  • 13
  • 15
    • 84864228244 scopus 로고    scopus 로고
    • Lunt, T., et al.: IDES: A progress report. In: Proceedings of the Sixth Annual Computer Security Applications Conference. Applied Computer Security Associates, pp. 273-285. Silver Spring, MD (1990)
    • Lunt, T., et al.: IDES: A progress report. In: Proceedings of the Sixth Annual Computer Security Applications Conference. Applied Computer Security Associates, pp. 273-285. Silver Spring, MD (1990)
  • 16
    • 38349059356 scopus 로고
    • UNICORN: Misuse detection for UNICOS™
    • IEEE Press, Los Alamitos, CA
    • Christoph, G.G., et al.: UNICORN: Misuse detection for UNICOS™. In: Supercomputing '95, p. 56. IEEE Press, Los Alamitos, CA (1995)
    • (1995) Supercomputing '95 , pp. 56
    • Christoph, G.G.1
  • 17
    • 0012282403 scopus 로고    scopus 로고
    • Computer intrusion: Detecting masquerades
    • Schonlau, M., et al.: Computer intrusion: Detecting masquerades. Statistical Science 16(1), 58-74 (2001)
    • (2001) Statistical Science , vol.16 , Issue.1 , pp. 58-74
    • Schonlau, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.