메뉴 건너뛰기




Volumn 35, Issue 3, 2009, Pages 517-526

A hybrid intrusion detection system design for computer network security

Author keywords

Computer network security; Computer networks; Hybrid intrusion detection system; Intrusion detection systems

Indexed keywords

COMPUTER CRIME; COMPUTERS; HEURISTIC METHODS; HYBRID SYSTEMS; INTERNET; NETWORK SECURITY;

EID: 62249168871     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2008.12.005     Document Type: Article
Times cited : (232)

References (33)
  • 1
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis, USA
    • Bace R. Intrusion detection (2000), Macmillan Technical Publishing, Indianapolis, USA
    • (2000) Intrusion detection
    • Bace, R.1
  • 2
    • 58149104386 scopus 로고    scopus 로고
    • Guide to intrusion detection and prevention systems (IDPS)
    • Scarfone K, Mell P. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication 800-94; 2007.
    • (2007) NIST Special Publication , vol.800 -94
    • Scarfone, K.1    Mell, P.2
  • 3
    • 0342600000 scopus 로고    scopus 로고
    • An introduction to intrusion detection and assessment for system and network security management
    • Bace R. An introduction to intrusion detection and assessment for system and network security management. ICSA Intrusion Detection Systems Consortium Technical Report; 1999.
    • (1999) ICSA Intrusion Detection Systems Consortium Technical Report
    • Bace, R.1
  • 4
    • 62249133140 scopus 로고    scopus 로고
    • Bace R, Mell P. Intrusion detection systems. NIST Special Publication on Intrusion Detection Systems; 2001, SP 800-31.
    • Bace R, Mell P. Intrusion detection systems. NIST Special Publication on Intrusion Detection Systems; 2001, SP 800-31.
  • 5
    • 62249173827 scopus 로고    scopus 로고
    • Dayioǧlu B. Use of passive network mapping to enhance network intrusion detection. Thesis (Master), The Graduate School of Natural and Applied Sciences of the Middle East Technical University; 2001.
    • Dayioǧlu B. Use of passive network mapping to enhance network intrusion detection. Thesis (Master), The Graduate School of Natural and Applied Sciences of the Middle East Technical University; 2001.
  • 7
    • 0023294428 scopus 로고    scopus 로고
    • An intrusion-detection model
    • Denning D.E. An intrusion-detection model. IEEE Trans Software Eng 13 2 (1997) 222-232
    • (1997) IEEE Trans Software Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 18
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • Mahoney MV. Network traffic anomaly detection based on packet bytes. In Proceedings of ACM-SAC; 2003.
    • (2003) Proceedings of ACM-SAC
    • Mahoney, M.V.1
  • 24
    • 62249099319 scopus 로고    scopus 로고
    • Snort Users Manual 2.6.1; 3 December 2006. .
    • Snort Users Manual 2.6.1; 3 December 2006. .
  • 25
    • 33645402669 scopus 로고    scopus 로고
    • Publishing as Prentice Hall PTR, Upper Saddle River, New Jersey
    • Rehman R.U. Intrusion detection systems with snort (2003), Publishing as Prentice Hall PTR, Upper Saddle River, New Jersey
    • (2003) Intrusion detection systems with snort
    • Rehman, R.U.1
  • 27
    • 62249156369 scopus 로고    scopus 로고
    • Mahoney MV. A machine learning approach to detecting attacks by identifying anomalies in network traffic. Thesis (PhD), Florida Institute of Technology; 2003.
    • Mahoney MV. A machine learning approach to detecting attacks by identifying anomalies in network traffic. Thesis (PhD), Florida Institute of Technology; 2003.
  • 28
    • 35248857893 scopus 로고    scopus 로고
    • An Analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. Recent advances in intrusion detection
    • Pittsburgh, PA, USA; 8-10 September
    • Mahoney MV, Chan PK. An Analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. Recent advances in intrusion detection. In Sixth international symposium, Raid 2003, Pittsburgh, PA, USA; 8-10 September 2003. p. 220-39.
    • (2003) Sixth international symposium, Raid , pp. 220-239
    • Mahoney, M.V.1    Chan, P.K.2
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.