메뉴 건너뛰기




Volumn , Issue , 2007, Pages 326-331

Effective event description using trend template language and efficient intrusion detection

Author keywords

Intrusion Detection System (IDS); Network based IDS (NIDS); Snort; Trend detector; Trend Template Language (TTL); Trend Templates (TT)

Indexed keywords

ACCESS CONTROL; COMPUTATIONAL LINGUISTICS; COMPUTER PROGRAMMING LANGUAGES;

EID: 40949111927     PISSN: 1062922X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSMC.2007.4413743     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 40949134495 scopus 로고    scopus 로고
    • Aleph1 (1996). Smashing the Stack for Fun and Profit. Phrack# 49. Available: http://www.phrack.com
    • Aleph1 (1996). Smashing the Stack for Fun and Profit. Phrack# 49. Available: http://www.phrack.com
  • 2
    • 40949117481 scopus 로고    scopus 로고
    • nd IEEE-SMC Information Assurance Workshop (2001). 17-33
    • nd IEEE-SMC Information Assurance Workshop (2001). 17-33
  • 3
    • 0003604705 scopus 로고
    • Knowledge-Based Trend Detection and Diagnosis,
    • PhD dissertation, Dept. of Elect. Eng. and CS, MIT, May 12
    • I. J. Haimowitz., "Knowledge-Based Trend Detection and Diagnosis," PhD dissertation, Dept. of Elect. Eng. and CS, MIT, May 12, 1994.
    • (1994)
    • Haimowitz, I.J.1
  • 4
    • 40949161936 scopus 로고    scopus 로고
    • (Snort documentation page) S. Sturges. (2006-12-08). Available: http://www.snort.org/docs/snort_htmanuals/htmanual_261/node227.html
    • (Snort documentation page) S. Sturges. (2006-12-08). Available: http://www.snort.org/docs/snort_htmanuals/htmanual_261/node227.html
  • 5
    • 0004204715 scopus 로고    scopus 로고
    • A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,
    • M.S. Thesis, MIT
    • K. Kendall, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems," M.S. Thesis, MIT, 1999.
    • (1999)
    • Kendall, K.1
  • 9
    • 33746638729 scopus 로고    scopus 로고
    • Some representational limitations of the common intrusion specification language,
    • Tech. Rep, Laboratory for Computer Science, MIT, October, Available
    • J. Doyle, "Some representational limitations of the common intrusion specification language," Tech. Rep., Laboratory for Computer Science, MIT, October 1999, Available: http://www.medg.lcs.mit.edu/projects/maita/documents/ cc2/cisl/revised.txt
    • (1999)
    • Doyle, J.1
  • 10
    • 40949128578 scopus 로고    scopus 로고
    • Detectors should be characterized by likelihood ratios, not posterior probabilities,
    • Tech. Rep, Laboratory for Computer Science, MIT, June 1999, Revised February 1, Available
    • P. Szolovits, "Detectors should be characterized by likelihood ratios, not posterior probabilities," Tech. Rep., Laboratory for Computer Science, MIT, June 1999, Revised February 1, 2000, Available: http://www.medg.lcs.mit.edu/projects/maita/documents/likelihood/ detector-likelihoods.pdf
    • (2000)
    • Szolovits, P.1
  • 11
    • 0003551552 scopus 로고
    • Temporal reasoning in medical expert systems
    • MIT, Laboratory for Computer Science, 545 Technology Square, Cambridge, MA, 02139, Apr
    • I. S. Kohane, "Temporal reasoning in medical expert systems," TR 389, MIT, Laboratory for Computer Science, 545 Technology Square, Cambridge, MA, 02139, Apr. 1987.
    • (1987) TR 389
    • Kohane, I.S.1
  • 12
    • 0004831936 scopus 로고
    • Temporal reasoning in medical expert systems
    • R. Salamon, B. Blum, and M. Jorgensen, Eds, Washington, Oct, North-Holland
    • I. S. Kohane, "Temporal reasoning in medical expert systems," in MEDINFO 86: Proceedings of the Fifth Conference on Medical Informatics, R. Salamon, B. Blum, and M. Jorgensen, Eds., Washington, Oct. 1986, pp. 170-174, North-Holland.
    • (1986) MEDINFO 86: Proceedings of the Fifth Conference on Medical Informatics , pp. 170-174
    • Kohane, I.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.