메뉴 건너뛰기




Volumn 16, Issue 9, 2004, Pages 1157-1168

Metadata for anomaly-based security protocol attack deduction

Author keywords

Anomaly detection; Behavioral analysis; Security protocols; User profile

Indexed keywords

ANOMALY DETECTION; BEHAVIORAL ANALYSIS; SECURITY PROTOCOLS; USER PROFILE;

EID: 4544324490     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2004.43     Document Type: Review
Times cited : (18)

References (31)
  • 1
    • 84862424553 scopus 로고    scopus 로고
    • Critical foundations: Protecting America's infrastructures
    • Oct.
    • Presidential Commission on Critical Infrastructure Protection, "Critical Foundations: Protecting America's Infrastructures," commision report, Oct. 1997, http://www.pccip.gov/report_Jndex. html.
    • (1997) Commision Report
  • 3
    • 0036090428 scopus 로고    scopus 로고
    • An environment for security protocol intrusion detection
    • Jan.
    • A. Yasinsac, "An Environment for Security Protocol Intrusion Detection," J. Computer Security, vol. 10, nos. 1-2, pp. 177-188, Jan. 2002.
    • (2002) J. Computer Security , vol.10 , Issue.1-2 , pp. 177-188
    • Yasinsac, A.1
  • 4
    • 4544260009 scopus 로고    scopus 로고
    • A method for detecting intrusions on encrypted traffic
    • Computer Science Dept., Florida State Univ.
    • S. Goregaoker, "A Method for Detecting Intrusions on Encrypted Traffic," Technical Report TR-010703, Computer Science Dept., Florida State Univ., 2001.
    • (2001) Technical Report , vol.TR-010703
    • Goregaoker, S.1
  • 5
    • 4544257573 scopus 로고    scopus 로고
    • The monitor and principals
    • Computer Science Dept., Florida State Univ.
    • A. Melendez, "The Monitor and Principals," Technical Report TR-010701, Computer Science Dept., Florida State Univ., 2001.
    • (2001) Technical Report , vol.TR-010701
    • Melendez, A.1
  • 6
    • 4544299859 scopus 로고    scopus 로고
    • Knowledge base for intrusion detection system
    • Computer Science Dept., Florida State Univ.
    • N. Patel, "Knowledge Base for Intrusion Detection System," Technical Report TR-011203, Computer Science Dept., Florida State Univ., 2001.
    • (2001) Technical Report , vol.TR-011203
    • Patel, N.1
  • 14
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Oct.
    • P.A. Porras and P.G. Neumann, "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances," Proc. Nat'l Information Systems Security Conf., pp. 353-365, Oct. 1997.
    • (1997) Proc. Nat'l Information Systems Security Conf. , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 15
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the Production-Based Expert System Toolset (P-BEST)
    • May
    • U. Lindqvist and P.A. Porras, "Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)," Proc. 1999 IEEE Symp. Security and Privacy, pp. 146-161, May 1999.
    • (1999) Proc. 1999 IEEE Symp. Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 20
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • Jan.
    • T.Y.C. Woo and S.S. Lam, "Authentication for Distributed Systems," Computer, vol. 25, no. 1, pp. 39-52, Jan. 1992.
    • (1992) Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2
  • 22
  • 23
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Nov.
    • W. Lee and S.J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," Proc. ACM Trans. Information and System Security, pp. 227-261, Nov. 2000.
    • (2000) Proc. ACM Trans. Information and System Security , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 24
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
    • N. Ye and Q. Chen, "An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems," Proc. Quality and Reliability Eng. Int'l, vol. 17, no. 2, pp. 105-112, 2001.
    • (2001) Proc. Quality and Reliability Eng. Int'l , vol.17 , Issue.2 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 25
    • 0006025721 scopus 로고    scopus 로고
    • Identification of host audit data to detect attacks on low-level IP
    • T. Daniels and E.H. Spafford, "Identification of Host Audit Data to Detect Attacks on Low-level IP," J. Computer Security, vol. 7, no. 1, 1999.
    • (1999) J. Computer Security , vol.7 , Issue.1
    • Daniels, T.1    Spafford, E.H.2
  • 26
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the Production-Based Expert System Toolset (P-BEST)
    • U. Lindqvist and P.A. Porras, "Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)," Proc. 1999 IEEE CS Symp. Security and Privacy, pp. 146-61, 1999.
    • (1999) Proc. 1999 IEEE CS Symp. Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 27
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," J. Computer Security, no. 6, pp. 151-180, 1998.
    • (1998) J. Computer Security , Issue.6 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 28
    • 0003900915 scopus 로고
    • An application of pattern matching in intrusion detection
    • Dept. Computer Sciences, Purdue Univ.
    • S. Kumar and E.H. Spafford, "An Application of Pattern Matching in Intrusion Detection," Technical Report CSD-TR-94-013, Dept. Computer Sciences, Purdue Univ., 1994.
    • (1994) Technical Report , vol.CSD-TR-94-013
    • Kumar, S.1    Spafford, E.H.2
  • 29
    • 0015960104 scopus 로고
    • The string-to-string correction problem
    • Jan.
    • R.A. Wagner and M.J. Fischer, "The String-to-String Correction Problem," J. ACM, vol. 21, pp. 168-178, Jan. 1974.
    • (1974) J. ACM , vol.21 , pp. 168-178
    • Wagner, R.A.1    Fischer, M.J.2
  • 31
    • 0005329149 scopus 로고
    • Fast text searching with errors
    • Dept. of Computer Science, Univ. of Arizona
    • S. Wu and U. Manber, "Fast Text Searching With Errors," Technical Report TR. 91-11, Dept. of Computer Science, Univ. of Arizona, 1991.
    • (1991) Technical Report , vol.TR. 91-11
    • Wu, S.1    Manber, U.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.