메뉴 건너뛰기




Volumn , Issue , 2006, Pages 273-278

A prediction model of insider threat based on multi-agent

Author keywords

Attack tree; Insider threat; Multi agent; System security

Indexed keywords

ALGORITHMS; MATHEMATICAL MODELS; MULTI AGENT SYSTEMS; PROBABILITY DISTRIBUTIONS; USER INTERFACES;

EID: 38649116926     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SPCA.2006.297582     Document Type: Conference Paper
Times cited : (10)

References (12)
  • 1
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799[J]
    • Marianthi Theoharidou, et al. The insider threat to information systems and the effectiveness of ISO17799[J]. Computers & Security, 2005,24(6):472-484.
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1
  • 3
    • 26844488270 scopus 로고    scopus 로고
    • Vaibhav Gowadia, et al. PAID: A Probabilistic Agent-Based Intrusion Detection system[J].Computers & Security, 2005,24(7):529-545.
    • Vaibhav Gowadia, et al. PAID: A Probabilistic Agent-Based Intrusion Detection system[J].Computers & Security, 2005,24(7):529-545.
  • 6
    • 24344493979 scopus 로고    scopus 로고
    • CIDS: An agent-based intrusion detection system[J]
    • Dasqupta,D. et al. CIDS: An agent-based intrusion detection system[J]. Computers & Security, 2005,24(5):387-398.
    • (2005) Computers & Security , vol.24 , Issue.5 , pp. 387-398
    • Dasqupta, D.1
  • 8
    • 2542453149 scopus 로고    scopus 로고
    • Understanding risk through attack tree analysis[J]
    • Ingoldsby, Terrance R. Understanding risk through attack tree analysis[J]. Computer Security, 2004,20(2):33-59.
    • (2004) Computer Security , vol.20 , Issue.2 , pp. 33-59
    • Ingoldsby1    Terrance, R.2
  • 9
    • 0142092356 scopus 로고    scopus 로고
    • Generating IDS attack pattern automatically based on attack tree[J]
    • Xiang, Ga, et al. Generating IDS attack pattern automatically based on attack tree[J]. Journal of Beijing Institute of Technology. 2003, 12(2):138-142.
    • (2003) Journal of Beijing Institute of Technology , vol.12 , Issue.2 , pp. 138-142
    • Ga, X.1
  • 11
    • 0037001741 scopus 로고    scopus 로고
    • Towards the scalable implementation of a user level anomaly detection system
    • Anaheim, CA,October
    • R. Chinchani, S. Upadhyaya, and K. Kwiat. Towards the scalable implementation of a user level anomaly detection system. In Proceedings of the 2002 IEEE MILCOM Conference, Anaheim, CA,Volume 2, pages 7-10, October 2002.
    • (2002) Proceedings of the 2002 IEEE MILCOM Conference , vol.2 , pp. 7-10
    • Chinchani, R.1    Upadhyaya, S.2    Kwiat, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.