메뉴 건너뛰기




Volumn , Issue , 2004, Pages 102-111

A defense-centric taxonomy based on attack manifestations

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER CRIME; DATA PRIVACY; DATA REDUCTION; SENSOR DATA FUSION;

EID: 4544276923     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/dsn.2004.1311881     Document Type: Conference Paper
Times cited : (56)

References (30)
  • 1
    • 0038443107 scopus 로고    scopus 로고
    • A new taxonomy of web attacks suitable for efficient encoding
    • July
    • O. Alvarez and S. Petrovic. A new taxonomy of web attacks suitable for efficient encoding. Computers and Security, 22(5):435-449, July 2003.
    • (2003) Computers and Security , vol.22 , Issue.5 , pp. 435-449
    • Alvarez, O.1    Petrovic, S.2
  • 3
    • 0003411763 scopus 로고
    • A taxonomy of Unix and network security vulnerabilities
    • Department of Computer Science, University of California at Davis, May
    • M. Bishop. A taxonomy of Unix and network security vulnerabilities. Technical report, Department of Computer Science, University of California at Davis, May 1995.
    • (1995) Technical Report
    • Bishop, M.1
  • 4
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • July-August
    • H. Debar, M. Dacier, and A. Wespi. A revised taxonomy for intrusion-detection systems. Annals of Telecommunications, 55(7-6):361-378, July-August 2000.
    • (2000) Annals of Telecommunications , vol.55 , Issue.6-7 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 5
    • 0029716418 scopus 로고    scopus 로고
    • A sense of self for unix processes
    • Los Alamitos, CA, IEEE Computer Society Press, 6-8 May, Oakland, California
    • S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, CA, 1996. IEEE Computer Society Press, 6-8 May, Oakland, California.
    • (1996) IEEE Symposium on Security and Privacy , pp. 120-128
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3    Longstaff, T.A.4
  • 6
    • 0027961889 scopus 로고
    • Self-nonself discrimination in a computer
    • Los Alamitos, California. IEEE Computer Society Press. 16-18 May, Oakland, California
    • S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In IEEE Symposium on Security and Privacy, pages 202-212, Los Alamitos, California, 1994. IEEE Computer Society Press. 16-18 May, Oakland, California.
    • (1994) IEEE Symposium on Security and Privacy , pp. 202-212
    • Forrest, S.1    Perelson, A.S.2    Allen, L.3    Cherukuri, R.4
  • 9
    • 0003615205 scopus 로고    scopus 로고
    • A common language for computer security incidents
    • Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, October
    • J. D. Howard and T. A. Longstaff. A common language for computer security incidents. Technical Report SAND98-8667, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, October 1998.
    • (1998) Technical Report , vol.SAND98-8667
    • Howard, J.D.1    Longstaff, T.A.2
  • 10
    • 0004229237 scopus 로고    scopus 로고
    • PhD thesis, Comp. Sci. Dept., Purdue University, May
    • I. V. Krsul. Software Vulnerability Analysis. PhD thesis, Comp. Sci. Dept., Purdue University, May 1998.
    • (1998) Software Vulnerability Analysis
    • Krsul, I.V.1
  • 12
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws, with examples
    • September
    • C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, 26(3):211-254, September 1994.
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1    Bull, A.R.2    McDermott, J.P.3    Choi, W.S.4
  • 13
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Los Alamitos, California. IEEE Computer Society Press. 14-16 May, Oakland, California
    • W. Lee and D. Xiang. Information-theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, pages 130-143, Los Alamitos, California, 2001. IEEE Computer Society Press. 14-16 May, Oakland, California.
    • (2001) IEEE Symposium on Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 14
    • 0030676601 scopus 로고    scopus 로고
    • How to systematically classify computer security intrusions
    • Los Alamitos, CA. IEEE Computer Society Press. 4-7 May, Oakland, California
    • U. Lindqvist and E. Jonsson. How to systematically classify computer security intrusions. In IEEE Symposium on Security and Privacy, pages 154-163, Los Alamitos, CA, 1997. IEEE Computer Society Press. 4-7 May, Oakland, California.
    • (1997) IEEE Symposium on Security and Privacy , pp. 154-163
    • Lindqvist, U.1    Jonsson, E.2
  • 18
    • 0036472459 scopus 로고    scopus 로고
    • Anomaly detection in embedded systems
    • February
    • R. A. Maxion and K. M. C. Tan. Anomaly detection in embedded systems. IEEE Transactions on Computers, 51(2): 108-120, February 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.2 , pp. 108-120
    • Maxion, R.A.1    Tan, K.M.C.2
  • 20
    • 4544355970 scopus 로고    scopus 로고
    • Slide Presentation, available on the Internet at
    • M. J. Ranum. A taxonomy of Internet attacks. Slide Presentation, available on the Internet at http://pubweb.nfr.net/~mjr/pubs/pdf/internet- attacks.pdf, 1997.
    • (1997) A Taxonomy of Internet Attacks
    • Ranum, M.J.1
  • 22
    • 0003756180 scopus 로고
    • Columbia University Press, New York, Fourth printing
    • G. G. Simpson. Principles of Animal Taxonomy. Columbia University Press, New York, 1961, Fourth printing 1969.
    • (1961) Principles of Animal Taxonomy
    • Simpson, G.G.1
  • 25
    • 4544332621 scopus 로고    scopus 로고
    • Included in the strace version 4.2 software package, distributed on the RedHat 6.2 Linux installation CD (disc 1)
    • Strace(1) general command manual. Included in the strace version 4.2 software package, distributed on the RedHat 6.2 Linux installation CD (disc 1), 1999.
    • (1999) Strace(1) General Command Manual
  • 26
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • A. Wespi, G. Vigna, and L. Den, editors, 16-18 October 2002, Zurich, Switzerland, 2002. Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin
    • K. M. C. Tan, K. S. Killourhy, and R. A. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In A. Wespi, G. Vigna, and L. Den, editors, Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), pages 54-73, 16-18 October 2002, Zurich, Switzerland, 2002. Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin, 2002.
    • (2002) Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002) , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 27
    • 0036085540 scopus 로고    scopus 로고
    • "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
    • Los Alamitos, CA. IEEE Computer Society Press. 12-15 May, Berkeley, California
    • K. M. C. Tan and R. A. Maxion. "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector. In IEEE Symposium on Security and Privacy, pages 188-201, Los Alamitos, CA, 2002. IEEE Computer Society Press. 12-15 May, Berkeley, California.
    • (2002) IEEE Symposium on Security and Privacy , pp. 188-201
    • Tan, K.M.C.1    Maxion, R.A.2
  • 28
    • 0037252253 scopus 로고    scopus 로고
    • Determining the operational limits of an anomaly-based intrusion detector
    • January
    • K. M. C. Tan and R. A. Maxion. Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communications, 21(1):96-110, January 2003.
    • (2003) IEEE Journal on Selected Areas in Communications , vol.21 , Issue.1 , pp. 96-110
    • Tan, K.M.C.1    Maxion, R.A.2
  • 29
    • 35248821244 scopus 로고    scopus 로고
    • Hiding intrusions: From the abnormal to the normal and beyond
    • Heidelberg, Germany. Springer-Verlag. 7-9 October, Noordwijkerhout, The Netherlands
    • K. M. C. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In Information Hiding: 5th International Workshop, IH 2002, pages 1-17, Heidelberg, Germany, 2003. Springer-Verlag. 7-9 October 2002, Noordwijkerhout, The Netherlands.
    • (2002) Information Hiding: 5th International Workshop, IH 2002 , pp. 1-17
    • Tan, K.M.C.1    McHugh, J.2    Killourhy, K.3
  • 30
    • 4544338227 scopus 로고    scopus 로고
    • Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, June
    • D. J. Weber. A taxonomy of computer intrusions. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, June 1998.
    • (1998) A Taxonomy of Computer Intrusions
    • Weber, D.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.