메뉴 건너뛰기




Volumn , Issue , 2008, Pages 161-166

Operator-centric and adaptive intrusion detection

Author keywords

Adaptation; Intrusion detection; Operator centric; Sensor reconfiguration; System architecture

Indexed keywords

ALGORITHMS; ARCHITECTURAL DESIGN; ARCHITECTURE; COMPUTER CRIME; SENSORS; SIGNAL DETECTION;

EID: 55349141431     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAS.2008.42     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 4
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • June
    • T. F. Lunt, "A survey of intrusion detection techniques, Computers & Security, vol. 12, no. 4, pp. 405-418, June, 1993.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 5
    • 55349130462 scopus 로고    scopus 로고
    • K. E. Price, Host-based misuse detection and conventional operating systems' audit data collection, M.S. thesis, Purdue University, West Lafayette, IN, USA, 1997.
    • K. E. Price, "Host-based misuse detection and conventional operating systems' audit data collection, M.S. thesis, Purdue University, West Lafayette, IN, USA, 1997.
  • 6
    • 55349136406 scopus 로고    scopus 로고
    • Apache module mod_log_config, http://httpd.apache.org/docs/2. 2/mod/mod_log_config.html, Visited April, 2008.
    • "Apache module mod_log_config", http://httpd.apache.org/docs/2. 2/mod/mod_log_config.html, Visited April, 2008.
  • 7
    • 0003951499 scopus 로고
    • Sun Microsystems Inc, 2550 Garcia Avenue, Mountain View, CA, USA
    • Sun Microsystems Inc., SunSHIELD Basic Security Module Guide, 2550 Garcia Avenue, Mountain View, CA, USA, 1995.
    • (1995) SunSHIELD Basic Security Module Guide
  • 10
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • September
    • E. H. Spafford and D. Zamboni, "Intrusion detection using autonomous agents", Computer Networks, vol. 26, pp. 547-570, September, 2000.
    • (2000) Computer Networks , vol.26 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 16
  • 17
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach", Transactions on Software Engineering, vol. 21, no. 3, pp. 181-199, 1995.
    • (1995) Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 19
    • 55349107986 scopus 로고    scopus 로고
    • M. Roesch, Snort, http://www.snort.org, 2007, Visited June, 2007.
    • M. Roesch, "Snort", http://www.snort.org, 2007, Visited June, 2007.
  • 20
    • 0141838925 scopus 로고    scopus 로고
    • Why the magic number seven plus or minus two
    • August
    • T. L. Saaty and M. S. Ozdemir, "Why the magic number seven plus or minus two", Mathematical and Computer Modelling, vol. 38, no. 3, pp. 233-244, August 2003.
    • (2003) Mathematical and Computer Modelling , vol.38 , Issue.3 , pp. 233-244
    • Saaty, T.L.1    Ozdemir, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.