메뉴 건너뛰기




Volumn , Issue , 2008, Pages 432-437

An overview of recent advances in intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEMS; INFORMATION TECHNOLOGY; SECURITY OF DATA; SENSORS; SIGNAL DETECTION; SURVEYS; TECHNOLOGY;

EID: 51849165002     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2008.4594714     Document Type: Conference Paper
Times cited : (12)

References (30)
  • 1
    • 51849122665 scopus 로고    scopus 로고
    • CERT
    • CERT, "CERT Statistics", http://www.cert.org/stats/#notes, 2007.
    • (2007) CERT Statistics
  • 2
    • 84951717161 scopus 로고    scopus 로고
    • Statistics on Federal Incident Reports
    • The United States Computer Emergency Readiness Team US-CERT
    • "Statistics on Federal Incident Reports," The United States Computer Emergency Readiness Team (US-CERT) 2004.
    • (2004)
  • 4
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, 2007.
    • (2007) Computer Networks
    • Patcha, A.1    Park, J.-M.2
  • 7
    • 34247500449 scopus 로고    scopus 로고
    • A.-S. Mohammad and Z. Mohammad, Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection, in 30th Annual International Computer Software and Applications Conference, 2006, pp. 325-332
    • A.-S. Mohammad and Z. Mohammad, "Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection," in 30th Annual International Computer Software and Applications Conference, 2006, pp. 325-332.
  • 10
    • 0028201732 scopus 로고
    • Tolerance, Danger, and the Extended Family
    • P. Matzinger, "Tolerance, Danger, and the Extended Family," Annual Review in Immunology, vol. 12, pp. 991-1045, 1994.
    • (1994) Annual Review in Immunology , vol.12 , pp. 991-1045
    • Matzinger, P.1
  • 21
    • 35048855121 scopus 로고    scopus 로고
    • Agent-Based Distributed Intrusion Alert System
    • A. Ghosh and S. Sen, "Agent-Based Distributed Intrusion Alert System," in Distributed Computing, 2004, pp. 240-251.
    • (2004) Distributed Computing , pp. 240-251
    • Ghosh, A.1    Sen, S.2
  • 24
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • E. H. Spafford and D. Zamboni, "Intrusion detection using autonomous agents," Computer Networks, vol. 34, pp. 547-570, 2000.
    • (2000) Computer Networks , vol.34 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 25
    • 23944512147 scopus 로고    scopus 로고
    • An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks
    • S. B. Jeong, Y. W. Choi, and S. Kim, "An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks," in Information Security Applications, 2005, pp. 204-210.
    • (2005) Information Security Applications , pp. 204-210
    • Jeong, S.B.1    Choi, Y.W.2    Kim, S.3
  • 27
    • 35248857893 scopus 로고    scopus 로고
    • An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
    • M. V. Mahoney and P. K. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection," in Recent Advances in Intrusion Detection, 2003, pp. 220-237.
    • (2003) Recent Advances in Intrusion Detection , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.