메뉴 건너뛰기




Volumn 24, Issue 1, 2007, Pages 329-353

Intrusion prevention in information systems: Reactive and proactive responses

Author keywords

Information security; Intrusion detection; Intrusion prevention; Intrusion response

Indexed keywords

INFORMATION MANAGEMENT; INTRUSION DETECTION; OPTIMAL CONTROL SYSTEMS; SECURITY SYSTEMS; STRATEGIC PLANNING;

EID: 38349147070     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222240110     Document Type: Article
Times cited : (52)

References (37)
  • 2
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3, 3 (2000), 186-205.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 3
    • 2642515264 scopus 로고    scopus 로고
    • White Paper, United States Department of Commerce, Gaithersburg, MD, available at
    • Bace, R., and Mell, P. NIST special publication on intrusion detection systems. White Paper, United States Department of Commerce, Gaithersburg, MD, 2001 (available at http://csrc.nist.gov/publications/ nistpubs/800-31/sp800-31.pdf).
    • (2001) NIST special publication on intrusion detection systems
    • Bace, R.1    Mell, P.2
  • 6
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems (IDSs) in information technology security architecture
    • Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems (IDSs) in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 7
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu, H., and Raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis, 1, 3 (2004), 131-148.
    • (2004) Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 8
    • 7444252882 scopus 로고    scopus 로고
    • Poaching and the misappropriation of information: Transaction risks of information exchange
    • Fall
    • Clemons, E.K., and Hitt, L.M. Poaching and the misappropriation of information: Transaction risks of information exchange. Journal of Management Information Systems, 21, 2 (Fall 2004), 87-107.
    • (2004) Journal of Management Information Systems , vol.21 , Issue.2 , pp. 87-107
    • Clemons, E.K.1    Hitt, L.M.2
  • 9
    • 5844352567 scopus 로고
    • Adaptive information systems control: A reliability-based approach
    • Fall
    • De, P., and Hsu, C. Adaptive information systems control: A reliability-based approach. Journal of Management Information Systems, 3, 2 (Fall 1986), 33-51.
    • (1986) Journal of Management Information Systems , vol.3 , Issue.2 , pp. 33-51
    • De, P.1    Hsu, C.2
  • 10
  • 14
    • 3242665740 scopus 로고    scopus 로고
    • Information exploitation and interorganizational systems ownership
    • Fall
    • Han, K.; Kauffman, R.J.; and Nault, B.R. Information exploitation and interorganizational systems ownership. Journal of Management Information Systems, 21, 2 (Fall 2004), 109-135.
    • (2004) Journal of Management Information Systems , vol.21 , Issue.2 , pp. 109-135
    • Han, K.1    Kauffman, R.J.2    Nault, B.R.3
  • 15
    • 0033872873 scopus 로고    scopus 로고
    • Improving manufacturing performance through process change and knowledge creation
    • Janice, C., and Gaimon, C. Improving manufacturing performance through process change and knowledge creation. Management Science, 46, 2 (2000), 265-288.
    • (2000) Management Science , vol.46 , Issue.2 , pp. 265-288
    • Janice, C.1    Gaimon, C.2
  • 16
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch, K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, 6, 4 (2003), 443-471.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 18
    • 0018079655 scopus 로고
    • Basic principles of ROC analysis
    • Metz, C.E. Basic principles of ROC analysis. Seminars in Nuclear Medicine, 8, 4 (1978), 283-298.
    • (1978) Seminars in Nuclear Medicine , vol.8 , Issue.4 , pp. 283-298
    • Metz, C.E.1
  • 25
    • 36949004275 scopus 로고    scopus 로고
    • Software decoys for software counterintelligence
    • Rowe, N.C.; Michael, M.; Auguston, J.B.; and Riehle, R. Software decoys for software counterintelligence. IAnewsletter, 5, 1 (2002), 10-12.
    • (2002) IAnewsletter , vol.5 , Issue.1 , pp. 10-12
    • Rowe, N.C.1    Michael, M.2    Auguston, J.B.3    Riehle, R.4
  • 28
    • 0031288377 scopus 로고    scopus 로고
    • Reengineering effectiveness and the redesign of organizational control: A case study of the inland revenue authority of Singapore
    • Summer
    • Sia, S.K., and Neo, B.S. Reengineering effectiveness and the redesign of organizational control: A case study of the inland revenue authority of Singapore. Journal of Management Information Systems, 14, 1 (Summer 1997), 69-92.
    • (1997) Journal of Management Information Systems , vol.14 , Issue.1 , pp. 69-92
    • Sia, S.K.1    Neo, B.S.2
  • 29
    • 13944271875 scopus 로고    scopus 로고
    • Sinha, A.P., and May, J.H. Evaluating and tuning predictive data mining models using receiver operating characteristic curves. Journal of Management Information Systems, 21, 3 (Winter 2004-5), 249-280.
    • Sinha, A.P., and May, J.H. Evaluating and tuning predictive data mining models using receiver operating characteristic curves. Journal of Management Information Systems, 21, 3 (Winter 2004-5), 249-280.
  • 30
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • Spring
    • Sun, L.; Srivastava, R.P.; and Mock, T.J. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22, 4 (Spring 2006), 109-142.
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 32
    • 0023890867 scopus 로고
    • Measuring the accuracy of diagnostic systems
    • June
    • Swets, J.A. Measuring the accuracy of diagnostic systems. Science, 240, 4857 (June 1988) 1285-1293.
    • (1988) Science , vol.240 , Issue.4857 , pp. 1285-1293
    • Swets, J.A.1
  • 34
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Ulvila, J.W., and Gaffney, J.E., Jr. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 1, 1 (2004), 35-50.
    • (2004) Decision Analysis , vol.1 , Issue.1 , pp. 35-50
    • Ulvila, J.W.1    Gaffney Jr., J.E.2
  • 35
    • 84903755100 scopus 로고    scopus 로고
    • Honeypots for distributed denial of service attacks
    • Los Alamitos, CA: IEEE Computer Society
    • Weiler, N. Honeypots for distributed denial of service attacks. In Eleventh IEEE WET ICE Workshop on Enterprise Security (WETICE'02). Los Alamitos, CA: IEEE Computer Society, 2002, pp. 9-14.
    • (2002) Eleventh IEEE WET ICE Workshop on Enterprise Security (WETICE'02) , pp. 9-14
    • Weiler, N.1
  • 36
    • 14644423267 scopus 로고    scopus 로고
    • Relevant data expansion for learning concept drift from sparsely labeled data
    • Widyantoro, D.H., and Yen, J. Relevant data expansion for learning concept drift from sparsely labeled data. IEEE Transactions on Knowledge and Data Engineering, 17, 3 (2005), 401-412.
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.3 , pp. 401-412
    • Widyantoro, D.H.1    Yen, J.2
  • 37
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • Ye, N.; Emran, S.M.; Chen, Q.; and Vilbert, S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers, 51, 7 (2002), 810-820.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.