메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 34-43

A stateful intrusion detection system for World-Wide Web servers

Author keywords

Intrusion Detection; Security; World Wide Web

Indexed keywords

COMPLEX NETWORKS; COMPUTATIONAL LINGUISTICS; COMPUTER CRIME; DAMAGE DETECTION; MERCURY (METAL); PERSONAL COMPUTING; SECURITY OF DATA; SECURITY SYSTEMS; WEB SERVICES; WEBSITES; WORLD WIDE WEB;

EID: 62349108537     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2003.1254308     Document Type: Conference Paper
Times cited : (100)

References (25)
  • 2
    • 84947584994 scopus 로고    scopus 로고
    • Application-integrated data collection for security monitoring
    • LNCS, Davis, CA, October. Springer
    • M. Almgren and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In Proceedings of Recent Advances in Intrusion Detection (RAID), LNCS, pages 22-36, Davis, CA, October 2001. Springer.
    • (2001) Proceedings of Recent Advances in Intrusion Detection (RAID) , pp. 22-36
    • Almgren, M.1    Lindqvist, U.2
  • 3
    • 8644227174 scopus 로고    scopus 로고
    • Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA- 2001-19, July
    • CERT/CC. "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA- 2001-19, July 2001.
    • (2001) Code Red Worm
    • CERT/CC1
  • 4
    • 33744935097 scopus 로고    scopus 로고
    • Advisory CA- 2002-27, October
    • CERT/CC. Apache/mod ssl Worm. Advisory CA- 2002-27, October 2002.
    • (2002) Apache/mod Ssl Worm
    • CERT/CC1
  • 6
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S.T. Eckmann, G. Vigna, and R.A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71-104, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 8
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • Paul Helman and Gunar Liepins. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. In IEEE Transactions on Software Engineering, volume Vol 19, No. 9, pages 886-901, 1993.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 9
  • 12
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • May
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187, May 1997.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 13
    • 57349165976 scopus 로고    scopus 로고
    • Internet Draft, draft-koster-robots-00.txt, December
    • M. Koster. A Method for Web Robots Control. Internet Draft, draft-koster-robots-00.txt, December 1996.
    • (1996) A Method for Web Robots Control
    • Koster, M.1
  • 14
    • 84940110274 scopus 로고    scopus 로고
    • Detecting computer and network misuse with the production-based expert system toolset (P-BEST)
    • Oakland, California, May
    • U. Lindqvist and P.A. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 15
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion and denial of service: Eluding network intrusion detection
    • January
    • T.H. Ptacek and T.N. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, January 1998.
    • (1998) Technical Report, Secure Networks
    • Ptacek, T.H.1    Newsham, T.N.2
  • 20
    • 21944435070 scopus 로고    scopus 로고
    • An approach to sensor correlation
    • Tolouse, France, October
    • A. Valdes and K. Skinner. An Approach to Sensor Correlation. In Proceedings of RAID 2000, Tolouse, France, October 2000.
    • (2000) Proceedings of RAID 2000
    • Valdes, A.1    Skinner, K.2
  • 21
    • 84860434876 scopus 로고    scopus 로고
    • The STAT tool suite
    • Hilton Head, South Carolina, January. IEEE Computer Society Press
    • G. Vigna, S. Eckmann, and R. Kemmerer. The STAT Tool Suite. In Proceedings of DISCEX 2000, Hilton Head, South Carolina, January 2000. IEEE Computer Society Press.
    • (2000) Proceedings of DISCEX 2000
    • Vigna, G.1    Eckmann, S.2    Kemmerer, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.