메뉴 건너뛰기




Volumn 19, Issue , 2009, Pages 117-129

Next-generation misuse and anomaly prevention system

Author keywords

Anomaly detection; Bayesian networks; Data mining; Intrusion prevention; Machine learning; Misuse detection

Indexed keywords

COMPUTER CRIME; DISTRIBUTED PARAMETER NETWORKS; INFERENCE ENGINES; INFORMATION MANAGEMENT; INFORMATION SYSTEMS; INTELLIGENT NETWORKS; INTERNET; INTRUSION DETECTION; ROBOT LEARNING; SPEECH ANALYSIS; SPEECH RECOGNITION;

EID: 64549160247     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-00670-8_9     Document Type: Article
Times cited : (7)

References (25)
  • 1
    • 0012163225 scopus 로고    scopus 로고
    • Internet System Consortium
    • Internet System Consortium, Internet Domain Survey, http://www.isc.org
    • Internet Domain Survey
  • 2
    • 34249865012 scopus 로고    scopus 로고
    • Research on intrusion detection and response: A survey
    • Kabiri, P., Ghorbani, A.A.: Research on intrusion detection and response: A survey. Int. J. on Information Security 1(2), 84-102 (2005)
    • (2005) Int. J. on Information Security , vol.1 , Issue.2 , pp. 84-102
    • Kabiri, P.1    Ghorbani, A.A.2
  • 3
    • 0346955740 scopus 로고    scopus 로고
    • Alipio, P., Carvalho, P., Neves, J.: Using CLIPS to Detect Network Intrusion. In: Pires, F.M., Abreu, S.P. (eds.) EPIA 2003. LNCS, 2902, pp. 341-354. Springer, Heidelberg (2003)
    • Alipio, P., Carvalho, P., Neves, J.: Using CLIPS to Detect Network Intrusion. In: Pires, F.M., Abreu, S.P. (eds.) EPIA 2003. LNCS, vol. 2902, pp. 341-354. Springer, Heidelberg (2003)
  • 12
    • 84944220475 scopus 로고    scopus 로고
    • Skinner, K., Valdes, A.: Adaptive, Model-based Monitoring for Cyber Attack Detection. In: Debar, H., M'e, L., Wu, S.F. (eds.) RAID 2000. LNCS, 1907, pp. 80-92. Springer, Heidelberg (2000)
    • Skinner, K., Valdes, A.: Adaptive, Model-based Monitoring for Cyber Attack Detection. In: Debar, H., M'e, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 80-92. Springer, Heidelberg (2000)
  • 13
    • 55349093725 scopus 로고    scopus 로고
    • Data warehousing and data mining techniques for intrusion detection systems
    • Singhal, A., Jajodia, S.: Data warehousing and data mining techniques for intrusion detection systems. Int. J. on Information Security 1(2), 149-166 (2006)
    • (2006) Int. J. on Information Security , vol.1 , Issue.2 , pp. 149-166
    • Singhal, A.1    Jajodia, S.2
  • 15
    • 85090433665 scopus 로고    scopus 로고
    • SNORT: Lightweight intrusion detection for networks
    • Roesch, M.: SNORT: Lightweight intrusion detection for networks. In: 13th Systems Administration Conference, pp. 229-238 (1999)
    • (1999) 13th Systems Administration Conference , pp. 229-238
    • Roesch, M.1
  • 17
    • 55349103895 scopus 로고    scopus 로고
    • Metasploit: Exploit research (2006), http://www.metasploit.org
    • (2006) Exploit research
  • 19
    • 1842503081 scopus 로고    scopus 로고
    • An introduction to graphical models
    • Technical report. Intel Research, Intel Corporation
    • Murphy, K.: An introduction to graphical models. Technical report. Intel Research, Intel Corporation (2001)
    • (2001)
    • Murphy, K.1
  • 23
    • 0002049440 scopus 로고    scopus 로고
    • Learning Dynamic Bayesian Networks. Adaptive Processing of Sequences and Data Structures
    • Springer, London
    • Ghahramani, Z.: Learning Dynamic Bayesian Networks. Adaptive Processing of Sequences and Data Structures. In: International Summer School on Neural Networks, pp. 168-197. Springer, London (1998)
    • (1998) International Summer School on Neural Networks , pp. 168-197
    • Ghahramani, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.