메뉴 건너뛰기




Volumn 20, Issue 1, 2008, Pages 112-123

Intrusion-detection policies for IT security breaches

Author keywords

Decision analysis; Dynamic programming; IT security; Stochastic model applications

Indexed keywords


EID: 61349169100     PISSN: 10919856     EISSN: 15265528     Source Type: Journal    
DOI: 10.1287/ijoc.1070.0222     Document Type: Article
Times cited : (14)

References (32)
  • 1
    • 18944381640 scopus 로고    scopus 로고
    • Intrusion detection fly-off: Implications for the United States Navy
    • 97W096, MITRE, McLean, VA
    • Aguirre, S. J., W. H. Hill. 1997. Intrusion detection fly-off: Implications for the United States Navy. MITRE Technical Report MTR 97W096, MITRE, McLean, VA.
    • (1997) MITRE Technical Report MTR
    • Aguirre, S.J.1    Hill, W.H.2
  • 2
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axellson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inform. System Security 3 186-205.
    • (2000) ACM Trans. Inform. System Security , vol.3 , pp. 186-205
    • Axellson, S.1
  • 3
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu, H., S. Raghunathan. 2004. Configuration of detection software: A comparison of decision and game theory approaches. Decision Anal. 1 131-148.
    • (2004) Decision Anal , vol.1 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 4
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reaction for breached firms and internet security developers
    • Cavusoglu, H., B. Mishra, S. Raghunathan. 2004. The effect of internet security breach announcements on market value: Capital market reaction for breached firms and internet security developers. Intermit. J Electronic Commerce 9 69-105.
    • (2004) Intermit. J Electronic Commerce , vol.9 , pp. 69-105
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 5
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems (IDSs) in information technology (IT) security
    • Cavusoglu, H., B. Mishra, S. Raghunathan. 2005. The value of intrusion detection systems (IDSs) in information technology (IT) security. Inform. Systems Res. 16 28-46.
    • (2005) Inform. Systems Res , vol.16 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 6
  • 7
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis, and implications
    • IEEE Press, New York
    • D'haeseleer, P., S. Forrest, P. Helman. 1996. An immunological approach to change detection: Algorithms, analysis, and implications. IEEE Sympos. Security and Privacy. IEEE Press, New York.
    • (1996) IEEE Sympos. Security and Privacy
    • D'haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 8
    • 0020096117 scopus 로고
    • Minimax policies for unobscrvable inspections
    • Diamond, H. 1982. Minimax policies for unobscrvable inspections. Math. Oper. Res. 7 139-153.
    • (1982) Math. Oper. Res , vol.7 , pp. 139-153
    • Diamond, H.1
  • 9
  • 11
    • 58149098904 scopus 로고    scopus 로고
    • Gartner, Hype cycle for information security, Gartner, Stamford, CT
    • Gartner. 2003. Hype cycle for information security. Gartner Research Report, Gartner, Stamford, CT.
    • (2003) Gartner Research Report
  • 12
    • 0038223766 scopus 로고    scopus 로고
    • Using information security as a response to competitor analysis systems
    • Gordon, L. A., M. P. Loeb. 2001. Using information security as a response to competitor analysis systems. Comm. ACM 44 70-75.
    • (2001) Comm. ACM , vol.44 , pp. 70-75
    • Gordon, L.A.1    Loeb, M.P.2
  • 14
    • 2342646110 scopus 로고    scopus 로고
    • The effect of intrusion detection management methods on the return on investment
    • Iheagwara, C. 2004. The effect of intrusion detection management methods on the return on investment. Comput. Security 23 213-228.
    • (2004) Comput. Security , vol.23 , pp. 213-228
    • Iheagwara, C.1
  • 15
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson, E., T. Olovsson. 1997. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Engrg. 23 235-245.
    • (1997) IEEE Trans. Software Engrg , vol.23 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 16
    • 34548807057 scopus 로고    scopus 로고
    • A pattern matching model for misuse intrusion detection
    • Purdue University, West Lafayette, IN
    • Kumar, S., E. Spafford. 1996. A pattern matching model for misuse intrusion detection. The COAST Project. Purdue University, West Lafayette, IN.
    • (1996) The COAST Project
    • Kumar, S.1    Spafford, E.2
  • 17
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Lee, W, W. Fan, M. Miller, S. Stolfo, E. Zadok. 2001. Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Security 10 5-22.
    • (2001) J. Comput. Security , vol.10 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 19
    • 0027609384 scopus 로고
    • A survey of intrusion detection systems
    • Lunt, T. 1993, A survey of intrusion detection systems. Comput. Security 12 405-418.
    • (1993) Comput. Security , vol.12 , pp. 405-418
    • Lunt, T.1
  • 20
    • 61349156589 scopus 로고    scopus 로고
    • Moitra, S., S. Konda. 2000. A simulation model for managing survivability of networked information systems. Technical Report, Carnegie Mellon Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
    • Moitra, S., S. Konda. 2000. A simulation model for managing survivability of networked information systems. Technical Report, Carnegie Mellon Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
  • 22
    • 3543064959 scopus 로고    scopus 로고
    • NSS Group, 2nd ed. Oakwood House, Wennington, Cambridgeshire, UK
    • NSS Group. 2001. Intrusion Detection Systems Group Test, 2nd ed. Oakwood House, Wennington, Cambridgeshire, UK.
    • (2001) Intrusion Detection Systems Group Test
  • 23
    • 0026122870 scopus 로고
    • Optimal scheduling of inspections: A delayed Markov model with false positives and negatives
    • Ozekici, S., S. Pliska. 1991. Optimal scheduling of inspections: A delayed Markov model with false positives and negatives. Oper. Res. 39 261-273.
    • (1991) Oper. Res , vol.39 , pp. 261-273
    • Ozekici, S.1    Pliska, S.2
  • 24
    • 84873309550 scopus 로고
    • Penetration state transition analysis: A rule based intrusion detection approach
    • IEEE Press, Los Alamitos, CA
    • Porras, P., R. Kemmerer. 1992. Penetration state transition analysis: A rule based intrusion detection approach. IEEE Eighth Annual Comput. Security Appl. Conf., IEEE Press, Los Alamitos, CA, 220-229.
    • (1992) IEEE Eighth Annual Comput. Security Appl. Conf , pp. 220-229
    • Porras, P.1    Kemmerer, R.2
  • 25
    • 0002629036 scopus 로고    scopus 로고
    • Emerald: Event monitoring enabling responses to anomalous live disturbances
    • National Institute of Standards and Technology, Baltimore
    • Porras, P., P. Neumann. 1997. Emerald: Event monitoring enabling responses to anomalous live disturbances. Proc. 20th National Inform. Systems Security Conf., National Institute of Standards and Technology, Baltimore, 353-365.
    • (1997) Proc. 20th National Inform. Systems Security Conf , pp. 353-365
    • Porras, P.1    Neumann, P.2
  • 26
    • 3643079262 scopus 로고    scopus 로고
    • A software platform for testing intrusion detection systems
    • Puketza, N., M. Chung, R. O. Olsson, B. Mukherjee. 1997. A software platform for testing intrusion detection systems. IEEE Software 14 43-51.
    • (1997) IEEE Software , vol.14 , pp. 43-51
    • Puketza, N.1    Chung, M.2    Olsson, R.O.3    Mukherjee, B.4
  • 28
    • 0003883721 scopus 로고
    • Computer Security Basics
    • Associates, Inc, Sebastopol, CA
    • Russell, D., G. T. Gangemi. 1992. Computer Security Basics. O'Reilly amp; Associates, Inc., Sebastopol, CA.
    • (1992) O'Reilly amp
    • Russell, D.1    Gangemi, G.T.2
  • 29
    • 1542386294 scopus 로고    scopus 로고
    • ISS realsecure pushes past newer IDS players
    • Shipley, G. 1999. ISS realsecure pushes past newer IDS players. Network Comput. 10 95-111.
    • (1999) Network Comput , vol.10 , pp. 95-111
    • Shipley, G.1
  • 31
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Ulvila, J., J. Gaffney. 2004. A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1 35-50.
    • (2004) Decision Anal , vol.1 , pp. 35-50
    • Ulvila, J.1    Gaffney, J.2
  • 32
    • 0141632295 scopus 로고    scopus 로고
    • New directions for the AAPHID architecture
    • Purdue University, West Lafayette, IN
    • Zamboni, D., E. Spafford. 1999. New directions for the AAPHID architecture. Recent Advances in Intrusion Detection. Purdue University, West Lafayette, IN.
    • (1999) Recent Advances in Intrusion Detection
    • Zamboni, D.1    Spafford, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.