메뉴 건너뛰기




Volumn , Issue , 1999, Pages

On preventing intrusions by process behavior monitoring

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SYSTEMS; INFORMATION USE; INTRUSION DETECTION; NETWORK SECURITY; SPECIFICATION LANGUAGES; SPECIFICATIONS;

EID: 46749145715     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (30)
  • 3
    • 0022989344 scopus 로고
    • From Regular Expressions to Deterministic Automata
    • [Berry86]
    • [Berry86] G. Berry and R. Sethi, From Regular Expressions to Deterministic Automata, Theoretical Computer Science 48 pp. 117-126, 1986.
    • (1986) Theoretical Computer Science , vol.48 , pp. 117-126
    • Berry, G.1    Sethi, R.2
  • 4
    • 0030092390 scopus 로고    scopus 로고
    • Checking for Race Conditions in File Access
    • [Bishop96]
    • [Bishop96] M. Bishop and M. Dilger, Checking for Race Conditions in File Access. Computing Systems 9(2), pp. 131-152, 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 5
    • 84945709734 scopus 로고
    • Derivatives of Regular Expressions
    • [Brzozowski64]
    • [Brzozowski64] J.A. Brzozowski, Derivatives of Regular Expressions, Journal of ACM Vol. 11, No.4, pp. 481-494, 1964.
    • (1964) Journal of ACM , vol.11 , Issue.4 , pp. 481-494
    • Brzozowski, J.A.1
  • 6
    • 85095977767 scopus 로고    scopus 로고
    • [Cai98] M.S. Thesis, Department of Computer Science, Iowa State University, Dec
    • [Cai98] Y. Cai. A Specification-Based Approach for Intrusion Detection. M.S. Thesis, Department of Computer Science, Iowa State University, Dec 1998.
    • (1998) A Specification-Based Approach for Intrusion Detection
    • Cai, Y.1
  • 7
    • 85095968861 scopus 로고    scopus 로고
    • [CERT98] CERT Coordination Center Advisories 1988-1998
    • [CERT98] CERT Coordination Center Advisories 1988-1998, http://www.cert.org/advisories/index.html.
  • 8
    • 0009016272 scopus 로고
    • An evening with berferd, in which a cracker is lured, endured and studied
    • [Cheswick92]
    • [Cheswick92] W.R. Cheswick, An evening with berferd, in which a cracker is lured, endured and studied, Winter USENIX Conference, 1992.
    • (1992) Winter USENIX Conference
    • Cheswick, W.R.1
  • 10
    • 70549104461 scopus 로고
    • Software Defenses in Real- Time Control Systems
    • [Connet72]
    • [Connet72] J. Connet et al., Software Defenses in Real- Time Control Systems, IEEE Fault-Tolerant Comp. Sys., 1972.
    • (1972) IEEE Fault-Tolerant Comp. Sys
    • Connet, J.1
  • 16
    • 0027150412 scopus 로고
    • A real-time intrusion detection system for UNIX
    • [Ilgun93]
    • [Ilgun93] K. Ilgun, A real-time intrusion detection system for UNIX, IEEE Symp. on Security and Privacy, 1993.
    • (1993) IEEE Symp. on Security and Privacy
    • Ilgun, K.1
  • 17
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • [Ko94]
    • [Ko94] C. Ko, G. Fink and K. Levitt, Automated detection of vulnerabilities in privileged programs by execution monitoring, Computer Security Application Conference, 1994.
    • (1994) Computer Security Application Conference
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 19
    • 0031233430 scopus 로고    scopus 로고
    • Intrusion detection via system call traces
    • [Kosoresow97]
    • [Kosoresow97] A. Kosoresow and S. Hofmeyr, Intrusion detection via system call traces, IEEE Software '97.
    • IEEE Software '97
    • Kosoresow, A.1    Hofmeyr, S.2
  • 23
    • 0027609384 scopus 로고
    • A survey of Intrusion Detection Techniques
    • [Lunt93] June
    • [Lunt93] T. Lunt, A survey of Intrusion Detection Techniques, Computers and Security, 12(4), June 1993.
    • (1993) Computers and Security , vol.12 , Issue.4
    • Lunt, T.1
  • 25
    • 84873309550 scopus 로고
    • Penetration State Transition Analysis - A Rule Based Intrusion Detection Approach
    • [Porras92]
    • [Porras92] P. Porras and R. Kemmerer, Penetration State Transition Analysis - A Rule Based Intrusion Detection Approach, Computer Security Applications Conference, 1992.
    • (1992) Computer Security Applications Conference
    • Porras, P.1    Kemmerer, R.2
  • 28
    • 0042185201 scopus 로고
    • [Spafford91] Technical Report CSD-TR-993, Purdue University, West Lafayette September 19
    • [Spafford91] E. H. Spafford. The Internet Worm Incident, Technical Report CSD-TR-993, Purdue University, West Lafayette, IN, September 19, 1991.
    • (1991) The Internet Worm Incident
    • Spafford, E. H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.