메뉴 건너뛰기




Volumn 20, Issue 3, 2008, Pages 356-367

Improving intrusion prevention models: Dual-threshold and dual-filter approaches

Author keywords

Computer security; Decision analysis; Information systems: Management; Intrusion detection; Intrusion prevention; Systems

Indexed keywords


EID: 61349148588     PISSN: 10919856     EISSN: 15265528     Source Type: Journal    
DOI: 10.1287/ijoc.1070.0249     Document Type: Article
Times cited : (4)

References (38)
  • 1
    • 12344297643 scopus 로고    scopus 로고
    • The inverse optimal value problem
    • Ahmed, S., Y. Guan. 2005. The inverse optimal value problem. Math. Programming 102(1) 91-110.
    • (2005) Math. Programming , vol.102 , Issue.1 , pp. 91-110
    • Ahmed, S.1    Guan, Y.2
  • 2
    • 0020752471 scopus 로고
    • Jointly constrained biconvex programming
    • Al-Khayyal, F. A., J. E. Falk. 1983. Jointly constrained biconvex programming. Math. Oper. Res. 8(2) 273-286.
    • (1983) Math. Oper. Res , vol.8 , Issue.2 , pp. 273-286
    • Al-Khayyal, F.A.1    Falk, J.E.2
  • 4
    • 33646896924 scopus 로고    scopus 로고
    • Autonomic-computing approach to secure knowledge management: A game-theoretic analysis. 7EEE Trans, 487-497
    • Arora, H., B. K. Mishra, T. S. Raghu. 2006. Autonomic-computing approach to secure knowledge management: A game-theoretic analysis. 7EEE Trans. Systems, Man, Cybernetics-Part A: Systems Humans 36(3) 487-497.
    • (2006) Systems Humans , vol.36 , Issue.3
    • Arora, H.1    Mishra, B.K.2    Raghu, T.S.3
  • 5
    • 61349153099 scopus 로고    scopus 로고
    • Information assurance through defense in depth
    • 3-7
    • Ashley, B. K., G, L. Jackson, 1999. Information assurance through defense in depth. IAnewsletter 3(2) 3-7.
    • (1999) IAnewsletter , vol.3 , Issue.2
    • Ashley, B.K.G.1    Jackson, L.2
  • 6
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inform. System Security 3(3) 186-205.
    • (2000) ACM Trans. Inform. System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 7
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis
    • Bace, R. G. 2000. Intrusion Detection. Macmillan Technical Publishing, Indianapolis.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 9
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu, H., S. Raghunathan. 2004. Configuration of detection software: A comparison of decision and game theory approaches. Decision Anal. 1(3) 131-148.
    • (2004) Decision Anal , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 10
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology architecture
    • Cavusoglu, H., B. Mishra, S. Raghunathan. 2005. The value of intrusion detection systems in information technology architecture. Inform. Systems Res. 16(1) 28-46.
    • (2005) Inform. Systems Res , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 13
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D. E. 1987. An intrusion-detection model. IEEE Trans. Software Engrg. 13(2) 222-232.
    • (1987) IEEE Trans. Software Engrg , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 14
    • 61349143773 scopus 로고    scopus 로고
    • De Shon, M. 2002. Intrusion prevention versus intrusion detection. White paper, SecureWorks, Inc., Atlanta, http://www.netbankaudit.com/images/IPSvsIDS- White- Paper.pdf.
    • De Shon, M. 2002. Intrusion prevention versus intrusion detection. White paper, SecureWorks, Inc., Atlanta, http://www.netbankaudit.com/images/IPSvsIDS- White- Paper.pdf.
  • 17
    • 0034827684 scopus 로고    scopus 로고
    • Evaluation of intrusion detectors: A decision theory approach
    • Oakland, CA
    • Gaffney, J. E., J. W. Ulvila. 2001. Evaluation of intrusion detectors: A decision theory approach. Proc. IEEE Sympos. Security Privacy, Oakland, CA, 50-61.
    • (2001) Proc. IEEE Sympos. Security Privacy , pp. 50-61
    • Gaffney, J.E.1    Ulvila, J.W.2
  • 18
    • 0040226707 scopus 로고
    • A cutting plane algorithm for solving bilinear programs
    • Konno, H. 1976. A cutting plane algorithm for solving bilinear programs. Math. Programming 11 14-27.
    • (1976) Math. Programming , vol.11 , pp. 14-27
    • Konno, H.1
  • 19
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • San Antonio, TX, USENIX, Berkeley, CA
    • Lee, W., S. J. Stolfo. 1998. Data mining approaches for intrusion detection. Proc. 7th USENIX Security Sympos., San Antonio, TX, USENIX, Berkeley, CA, 79-94.
    • (1998) Proc. 7th USENIX Security Sympos , pp. 79-94
    • Lee, W.1    Stolfo, S.J.2
  • 20
    • 0002774999 scopus 로고    scopus 로고
    • Learning patterns from UNIX process execution traces for intrusion detection
    • RI, Association for the Advancement of Artificial Intelligence, Menlo Park, CA
    • Lee, W., S. J. Stolfo, P. K. Chan. 1997. Learning patterns from UNIX process execution traces for intrusion detection. Proc. AAAI97 Workshop on AI Approaches to Fraud Detection and Risk Management, Providence, RI, Association for the Advancement of Artificial Intelligence, Menlo Park, CA, 50-56.
    • (1997) Proc. AAAI97 Workshop on AI Approaches to Fraud Detection and Risk Management, Providence , pp. 50-56
    • Lee, W.1    Stolfo, S.J.2    Chan, P.K.3
  • 21
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Lee, W., W. Fan, M. Miller, S. J. Stolfo, E. Zadok. 2002. Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Security 10(1/2) 5-22.
    • (2002) J. Comput. Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.J.4    Zadok, E.5
  • 22
    • 61349154331 scopus 로고    scopus 로고
    • Lippmann, R. P., R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, M. A. Zissman. 1999. Results of the
    • Lippmann, R. P., R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, M. A. Zissman. 1999. Results of the
  • 23
    • 61349112167 scopus 로고    scopus 로고
    • DARPA 1998 off-line intrusion detection evaluation. Proc. 2nd Internal. Workshop on the Recent Adv. Intrusion Detection (RAID 99), West Lafayette, IN, http://www.raid-symposium.org/raid99/PAPERS/Lippmann-DARPA.pdf.
    • DARPA 1998 off-line intrusion detection evaluation. Proc. 2nd Internal. Workshop on the Recent Adv. Intrusion Detection (RAID 99), West Lafayette, IN, http://www.raid-symposium.org/raid99/PAPERS/Lippmann-DARPA.pdf.
  • 24
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems. 7EEE
    • McHugh, J., A. Christie, J. Allen. 2000. Defending yourself: The role of intrusion detection systems. 7EEE Software 17(5) 42-51.
    • (2000) Software , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 25
    • 0003612091 scopus 로고
    • Michie, D, D. J. Spiegelhalter, C. C. Tayor, eds, Ellis Horwood, London
    • Michie, D., D. J. Spiegelhalter, C. C. Tayor, eds. 1994. Machine Learning, Neural and Statistical Classification. Ellis Horwood, London.
    • (1994) Machine Learning, Neural and Statistical Classification
  • 26
    • 61349172012 scopus 로고    scopus 로고
    • Nitro Data Systems, Inc. 2004. Intrusion prevention. White paper, Nitro Data Systems, Inc., Portsmouth, NH, http://www.securitytechnet.com/resource/ security/ids/NGDB.pdf.
    • Nitro Data Systems, Inc. 2004. Intrusion prevention. White paper, Nitro Data Systems, Inc., Portsmouth, NH, http://www.securitytechnet.com/resource/ security/ids/NGDB.pdf.
  • 29
    • 0036848331 scopus 로고    scopus 로고
    • Stopping intruders outside the gates
    • Paulson, L. D. 2002. Stopping intruders outside the gates. Computer 35(11) 20-22.
    • (2002) Computer , vol.35 , Issue.11 , pp. 20-22
    • Paulson, L.D.1
  • 30
    • 84862759407 scopus 로고    scopus 로고
    • Intrusion detection⋯ or prevention?
    • Piscitello, D. 2002. Intrusion detection⋯ or prevention? Bus. Comm. Rev. 42-45.
    • (2002) Bus. Comm. Rev , pp. 42-45
    • Piscitello, D.1
  • 31
    • 61349106038 scopus 로고    scopus 로고
    • Erecting barriers
    • Robb, D. 2005. Erecting barriers. Computer-world 39(12) 42-44.
    • (2005) Computer-world , vol.39 , Issue.12 , pp. 42-44
    • Robb, D.1
  • 33
    • 33645141316 scopus 로고    scopus 로고
    • Intrusion prevention systems: Security's silver bullet?
    • Sequeira, D. 2003. Intrusion prevention systems: Security's silver bullet? Bus. Comm. Rev. 33 36-41.
    • (2003) Bus. Comm. Rev , vol.33 , pp. 36-41
    • Sequeira, D.1
  • 34
    • 85012240666 scopus 로고    scopus 로고
    • Data mining- based intrusion detectors: An overview of the Columbia IDS project
    • Stolfo, S. J., W. Lee, P. K. Chan, W. Fan, E. Eskin. 2001. Data mining- based intrusion detectors: An overview of the Columbia IDS project. SIGMOD Record 30(4) 5-14.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 5-14
    • Stolfo, S.J.1    Lee, W.2    Chan, P.K.3    Fan, W.4    Eskin, E.5
  • 35
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Ulvila, J. W., J. E. Gaffney. 2004. A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1(1) 35-50.
    • (2004) Decision Anal , vol.1 , Issue.1 , pp. 35-50
    • Ulvila, J.W.1    Gaffney, J.E.2
  • 36
    • 0003636516 scopus 로고    scopus 로고
    • U.S. Joint Chiefs of Staff, Special publication, U.S. Government Printing Office, Washington, D.C
    • U.S. Joint Chiefs of Staff. 2000. Information assurance through defense in depth. Special publication, U.S. Government Printing Office, Washington, D.C.
    • (2000) Information assurance through defense in depth
  • 37
    • 84905738826 scopus 로고    scopus 로고
    • Intrusion prevention systems (IPS)
    • The NSS Group, Ltd, Des Plaines, IL
    • Walder, B. 2004. Intrusion prevention systems (IPS). White paper, The NSS Group, Ltd., Des Plaines, IL, http://www.nss.co.uk/WhitePapers/intrusion- prevention-systems.htm.
    • (2004) White paper
    • Walder, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.