메뉴 건너뛰기




Volumn , Issue , 2006, Pages 16-21

Context based application level intrusion detection system

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT FREE LANGUAGES; CRYPTOGRAPHY; INTERCONNECTION NETWORKS; NETWORK SECURITY; SEMANTIC WEB; TELECOMMUNICATION TRAFFIC;

EID: 43449117487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNS.2006.34     Document Type: Conference Paper
Times cited : (14)

References (27)
  • 1
    • 3042601656 scopus 로고    scopus 로고
    • T.Abbes, A.Bouhoula, M.Rusinowitch, Protocol Analysis in Intrusion Detection Using Decision Tree. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC' 04), IEEE, 2004.
    • [1]T.Abbes, A.Bouhoula, M.Rusinowitch, "Protocol Analysis in Intrusion Detection Using Decision Tree". Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC' 04), IEEE, 2004.
  • 2
    • 84860099664 scopus 로고    scopus 로고
    • [2]Ad-Aware, http://www.lavasoftusa.com/software/adaware/, 2004.
    • (2004) Ad-Aware
  • 4
    • 0029267472 scopus 로고
    • State Transition Analysis: A Rule-Based Intrusion Detection System
    • March
    • [4]K.Ilgun, R.A.Kemmerer, and P.A.Porras. "State Transition Analysis: A Rule-Based Intrusion Detection System", IEEE Transactions on Software Engineering, 21(3): 181-199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 6
    • 0003442287 scopus 로고    scopus 로고
    • Knowledge discovery in databases DARPA archive
    • Knowledge discovery in databases DARPA archive. Task Description. http://kdd.ics.uci.edu/databases/kddcup99/task.html
    • Task Description
  • 8
    • 0036038437 scopus 로고    scopus 로고
    • Service-specific Anomaly Detection for Network Intrusion Detection
    • ACM Scientific Press,March
    • [8]C.Kruegel, T.Toth, and E.Kirda. "Service-specific Anomaly Detection for Network Intrusion Detection", In Symposium on Applied Computing (SAC), ACM Scientific Press,March 2002.
    • (2002) Symposium on Applied Computing (SAC)
    • Kruegel, C.1    Toth, T.2    Kirda, E.3
  • 9
    • 35248819234 scopus 로고    scopus 로고
    • Using decision trees to improve signature-based intrusion detection
    • th International Workshop on the Recent Advances in Intrusion Detection RAID'2003, November
    • th International Workshop on the Recent Advances in Intrusion Detection (RAID'2003), LNCS v.2820, pages 173-191, November 2003.
    • (2003) LNCS , vol.2820 , pp. 173-191
    • Krugel, C.1    Toth, T.2
  • 10
    • 0029308744 scopus 로고
    • The Application of Semantic Classification Trees to Natural Language Understanding
    • May
    • [10]R.Kuhn and R.D.Mori. "The Application of Semantic Classification Trees to Natural Language Understanding". In IEEE transactions on pattern analysis and machine intelligence, Vol. 17, No. 5, May 1995.
    • (1995) IEEE transactions on pattern analysis and machine intelligence , vol.17 , Issue.5
    • Kuhn, R.1    Mori, R.D.2
  • 11
    • 0032630098 scopus 로고    scopus 로고
    • Detecting Computer and Network Misuse with the Production-Based Expert System Toolset(P-BEST)
    • Oakland,California,May
    • [11]U.Lindqvist and P.A.Porras. "Detecting Computer and Network Misuse with the Production-Based Expert System Toolset(P-BEST)".In IEEE Symposium on Security and Privacy, pages 146-161 ,Oakland,California,May 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 13
    • 43449110398 scopus 로고    scopus 로고
    • Luo.S and Marin.G.A, Modeling networking protocols to test intrusion detection systems, Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov. 2004.
    • Luo.S and Marin.G.A," Modeling networking protocols to test intrusion detection systems, "Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov. 2004.
  • 14
    • 43449123001 scopus 로고    scopus 로고
    • Microsoft security bulletin ms02-039. January
    • [14]Microsoft security bulletin ms02-039. January 2003. http://www.microsoft.com/technet/treeview/default.as p?url=/technet/security/ bulletin/MS02-039.asp.
    • (2003)
  • 15
    • 43449089750 scopus 로고    scopus 로고
    • Mogul.J, Fielding. R, Gettys.J, Frystyk.H, Masinter.L, Leach.P, Bemers-Lee.T, June 1999.RFC2616: Hypertext Transfer Protocol -HTTP/1.1.
    • Mogul.J, Fielding. R, Gettys.J, Frystyk.H, Masinter.L, Leach.P, Bemers-Lee.T, June 1999.RFC2616: Hypertext Transfer Protocol -HTTP/1.1.
  • 20
    • 43449110037 scopus 로고    scopus 로고
    • http://www.xambala.com
  • 21
    • 43449106738 scopus 로고    scopus 로고
    • Seshadri. V.R,Balaji, Vaidehi. V,Srinivasan.N Semantic Intrusion Detection System-Interm Technical Report, Xambala Inc.,2006.
    • Seshadri. V.R,Balaji, Vaidehi. V,Srinivasan.N "Semantic Intrusion Detection System-Interm Technical Report", Xambala Inc.,2006.
  • 23
    • 14844315860 scopus 로고    scopus 로고
    • [23]SpywareBlaster, http://www.javacoolsoftware.com/spywareblaster.html /,2004.
    • (2004) SpywareBlaster
  • 25
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A System for detecting network intruders in real-time
    • San Antonio, TX, USA, January
    • th USENIX Security Symposium, San Antonio, TX, USA, January 1998.
    • (1998) th USENIX Security Symposium
    • Paxson, V.1
  • 27
    • 43449138144 scopus 로고    scopus 로고
    • Yu.X, Jianping.W and Yin.X,Study on Conformance Testing of Hypertext Transfer Protocol,In Proceedings of ICCT 2003,Department of Computer Science, Tsinghua University, Beijing, 100084, China.
    • Yu.X, Jianping.W and Yin.X,"Study on Conformance Testing of Hypertext Transfer Protocol",In Proceedings of ICCT 2003,Department of Computer Science, Tsinghua University, Beijing, 100084, China.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.