메뉴 건너뛰기




Volumn , Issue , 2007, Pages 71-78

A novelty-driven approach to intrusion alert correlation based on distributed hash tables

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEMS; DATA COMMUNICATION SYSTEMS; DATA STORAGE EQUIPMENT; HIERARCHICAL SYSTEMS; SECURITY OF DATA; SENSORS; SIGNAL DETECTION; TECHNICAL PRESENTATIONS; TELECOMMUNICATION NETWORKS; WEIGHT CONTROL;

EID: 48049102734     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2007.4381564     Document Type: Conference Paper
Times cited : (10)

References (26)
  • 1
    • 48049099857 scopus 로고    scopus 로고
    • Intrusion detection systems: Perspective
    • Technical report, Gartner Inc
    • A. Allen. Intrusion detection systems: Perspective. Technical report, Gartner Inc., 2003.
    • (2003)
    • Allen, A.1
  • 2
    • 84964194161 scopus 로고    scopus 로고
    • A. Andrzejak and Z. Xu. Scalable, efficient range queries for grid information services. p2p, 00:33-40, 2002.
    • A. Andrzejak and Z. Xu. Scalable, efficient range queries for grid information services. p2p, 00:33-40, 2002.
  • 3
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Technical Report 99-15, Chalmers University of Technology, Department of Computer Engineering
    • S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers University of Technology, Department of Computer Engineering, 2000.
    • (2000)
    • Axelsson, S.1
  • 7
    • 48049096765 scopus 로고    scopus 로고
    • H. Debar, D. Curry, and B. Feinstein. The intrusion detection message exchange format. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml- 14.txt (last visited: 2006/08), June 2005. Internet-Draft, http://www.ietf.org/ internet-drafts/draft-ietf-idwg-idmef-xml-14.txt.
    • H. Debar, D. Curry, and B. Feinstein. The intrusion detection message exchange format. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml- 14.txt (last visited: 2006/08), June 2005. Internet-Draft, http://www.ietf.org/ internet-drafts/draft-ietf-idwg-idmef-xml-14.txt.
  • 13
    • 0011066222 scopus 로고    scopus 로고
    • Applying mobile agents to intrusion detection and response
    • Technical Report 6416, National Institute of Standards and Technology, Computer Security Division
    • W. Jansen, P. Meli, T. Karygiannis, and D. Marks. Applying mobile agents to intrusion detection and response. Technical Report 6416, National Institute of Standards and Technology, Computer Security Division, 1999.
    • (1999)
    • Jansen, W.1    Meli, P.2    Karygiannis, T.3    Marks, D.4
  • 15
    • 28544452631 scopus 로고    scopus 로고
    • A survey of interestingness measures for knowledge discovery
    • K. McGarry. A survey of interestingness measures for knowledge discovery. Knowledge Engineering Review, 20(1):39-61, 2005.
    • (2005) Knowledge Engineering Review , vol.20 , Issue.1 , pp. 39-61
    • McGarry, K.1
  • 22
    • 48049112339 scopus 로고    scopus 로고
    • A survey of distributed intrusion detection approaches
    • Technical Report CR/0501001, National Center for Supercomputing Applications NCSA
    • M. Treaster. A survey of distributed intrusion detection approaches. Technical Report CR/0501001, National Center for Supercomputing Applications (NCSA), 2005.
    • (2005)
    • Treaster, M.1
  • 25
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer based intrusion detection system
    • G. B. White, E. A. Fisch, and U. W. Pooch. Cooperating security managers: A peer based intrusion detection system. IEEE Network, 10(1):20-23, 1996.
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.