메뉴 건너뛰기




Volumn , Issue , 2008, Pages 23-26

Intrusion detection: A survey

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; COMPUTERS; INTERNET; METROPOLITAN AREA NETWORKS; PERSONAL COMPUTING; SECURITY OF DATA; SURVEYS; TAXONOMIES;

EID: 58149096660     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSNC.2008.44     Document Type: Conference Paper
Times cited : (142)

References (12)
  • 3
    • 34249865012 scopus 로고    scopus 로고
    • Research on Intrusion Detection and Response: A Survey
    • P. Kabiri and A.A. Ghorbani, "Research on Intrusion Detection and Response: A Survey," Int. Journal of Network Security, vol.1, No.2, pp. 84-102, 2005.
    • (2005) Int. Journal of Network Security , vol.1 , Issue.2 , pp. 84-102
    • Kabiri, P.1    Ghorbani, A.A.2
  • 5
    • 58149085863 scopus 로고    scopus 로고
    • A.K. Jones and R.S. Sielken, Computer system Intrusion Detection: A Survey, Department of Computer Science, University of Virginia, 2000.
    • A.K. Jones and R.S. Sielken," Computer system Intrusion Detection: A Survey," Department of Computer Science, University of Virginia, 2000.
  • 7
    • 58149088946 scopus 로고    scopus 로고
    • White paper, Intrusion Detection: A Survey, ch.2, DAAD19-01, NSF, 2002.
    • White paper, "Intrusion Detection: A Survey," ch.2, DAAD19-01, NSF, 2002.
  • 8
    • 58149104386 scopus 로고    scopus 로고
    • Guide to Intrusion Detection and Prevention Systems (IDPS)
    • Feb
    • K. Scarfone, P. Mell, "Guide to Intrusion Detection and Prevention Systems (IDPS)," NIST Special Publication 800-94, Feb. 2007.
    • (2007) NIST Special Publication , vol.800 -94
    • Scarfone, K.1    Mell, P.2
  • 10
    • 49749101200 scopus 로고    scopus 로고
    • Cyber attack modeling and simulation for network security analysis
    • Dec
    • M.E. Kuhl, M. Sudit, J. Kistner, and K. Costantini, "Cyber attack modeling and simulation for network security analysis," IEEE Simidation Conf., pp. 1180-1188, Dec. 2007.
    • (2007) IEEE Simidation Conf , pp. 1180-1188
    • Kuhl, M.E.1    Sudit, M.2    Kistner, J.3    Costantini, K.4
  • 11
    • 58149096128 scopus 로고    scopus 로고
    • M. Blanc, J. Briffaut, P. Clemente, M. Gad El, and Rab C. Toinard, A Collaborative Approach for Access Control, Intrusion Detection and Security Testing, IEEE Infocom 2006.
    • M. Blanc, J. Briffaut, P. Clemente, M. Gad El, and Rab C. Toinard, "A Collaborative Approach for Access Control, Intrusion Detection and Security Testing," IEEE Infocom 2006.
  • 12
    • 38149124483 scopus 로고    scopus 로고
    • Anomaly Detection for HTTP Intrusion Detection: Algorithm Comparison and the Effect of generalization on Accuracy,
    • Ph.D. dissertation, Univ. of New Mexico, Albuquerque
    • K.L. Ingham, "Anomaly Detection for HTTP Intrusion Detection: Algorithm Comparison and the Effect of generalization on Accuracy," Ph.D. dissertation, Univ. of New Mexico, Albuquerque, 2007.
    • (2007)
    • Ingham, K.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.