메뉴 건너뛰기




Volumn 2009, Issue 6, 2009, Pages 12-16

Towards scalable intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION SYSTEMS;

EID: 67649419077     PISSN: 13534858     EISSN: None     Source Type: Trade Journal    
DOI: 10.1016/S1353-4858(09)70064-9     Document Type: Article
Times cited : (5)

References (31)
  • 2
    • 55149113904 scopus 로고    scopus 로고
    • S. Antonatos, M. Athanatos, G. Kondaxis, J. Velegrakis, N. Hatzibodozis, S. Ioannidis, and E.P. Markatos. Honey@home: A new approach to largescale threat monitoring. Information Security Threats Data Collection and Sharing, WOMBAT Workshop on, 0:3-16, 2008.
    • S. Antonatos, M. Athanatos, G. Kondaxis, J. Velegrakis, N. Hatzibodozis, S. Ioannidis, and E.P. Markatos. Honey@home: A new approach to largescale threat monitoring. Information Security Threats Data Collection and Sharing, WOMBAT Workshop on, 0:3-16, 2008.
  • 4
    • 67649453705 scopus 로고    scopus 로고
    • Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, and Philip Nobles. Searching for Optimal IDS Sensor Placement. Under Review
    • Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, and Philip Nobles. Searching for Optimal IDS Sensor Placement. Under Review.
  • 6
    • 67649428281 scopus 로고    scopus 로고
    • Howard Chivers, Siraj. A. Shaikh, Philip Nobles, John A. Clark, and Hao Chen. Accumulating evidence of insider attacks. The First International Workshop on Managing Insider Security Threats, held in conjunction with Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), West Lafayette, USA, June 15-19, 2009. To Appear.
    • Howard Chivers, Siraj. A. Shaikh, Philip Nobles, John A. Clark, and Hao Chen. Accumulating evidence of insider attacks. The First International Workshop on Managing Insider Security Threats, held in conjunction with Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), West Lafayette, USA, June 15-19, 2009. To Appear.
  • 7
    • 14844312929 scopus 로고    scopus 로고
    • Holger Dreger, Anja Feldmann, Vern Paxson, and Robin Sommer. Operational experiences with high-network intrusion detection. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 2529, 2004, pages 2-11, ACM, 2004.
    • Holger Dreger, Anja Feldmann, Vern Paxson, and Robin Sommer. Operational experiences with high-volume network intrusion detection. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 2529, 2004, pages 2-11, ACM, 2004.
  • 8
    • 56549129238 scopus 로고    scopus 로고
    • Predicting the resource consumption of network intrusion detection systems
    • Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 1517, 2008. Proceedings, of, Springer
    • Holger Dreger, Anja Feldmann, Vern Paxson, and Robin Sommer. Predicting the resource consumption of network intrusion detection systems. In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 1517, 2008. Proceedings, volume 5230 of Lecture Notes in Computer Science, pages 135-154. Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5230 , pp. 135-154
    • Dreger, H.1    Feldmann, A.2    Paxson, V.3    Sommer, R.4
  • 9
    • 34547284915 scopus 로고    scopus 로고
    • Scan detection on very large networks using logistic regression modeling. Computers and Communications
    • Carrie Gates, Joshua J. McNutt, Joseph B. Kadane, and Marc I. Kellner. Scan detection on very large networks using logistic regression modeling. Computers and Communications, IEEE Symposium on, 0:402-408, 2006.
    • (2006) IEEE Symposium on , vol.0 , pp. 402-408
    • Gates, C.1    McNutt, J.J.2    Kadane, J.B.3    Kellner, M.I.4
  • 10
    • 34248574593 scopus 로고    scopus 로고
    • The mechanics of lawful interception
    • Gleave S. The mechanics of lawful interception. Network Security 5 2007 (May 2007) 8-11
    • (2007) Network Security , vol.5 , Issue.2007 , pp. 8-11
    • Gleave, S.1
  • 11
    • 67650317025 scopus 로고    scopus 로고
    • Jose M. González, Vern Paxson, and Nicholas Weaver. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. In Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors, Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 2831, 2007, pages 139-149. ACM, 2007.
    • Jose M. González, Vern Paxson, and Nicholas Weaver. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. In Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors, Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 2831, 2007, pages 139-149. ACM, 2007.
  • 14
    • 0036090464 scopus 로고    scopus 로고
    • Using internal sensors and embedded detectors for intrusion detection
    • Kerschbaum F., Spafford E.H., and Zamboni D. Using internal sensors and embedded detectors for intrusion detection. Journal of Computer Security 10 1/2 (2002) 23-70
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 23-70
    • Kerschbaum, F.1    Spafford, E.H.2    Zamboni, D.3
  • 16
    • 34047168454 scopus 로고    scopus 로고
    • An annotated review of past papers on attack graphs
    • Technical Report ESCTR2005054, MIT Lincoln Laboratory, Lexington, MA
    • R. P. Lippmann and K. W. Ingols. An annotated review of past papers on attack graphs. Technical Report ESCTR2005054, MIT Lincoln Laboratory, Lexington, MA, 2005.
    • (2005)
    • Lippmann, R.P.1    Ingols, K.W.2
  • 17
    • 14944369649 scopus 로고    scopus 로고
    • Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry L. Peterson. Characteristics of internet background radiation. In Alfio Lombardo and James F. Kurose, editors, Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004, Taormina, Sicily, Italy, October 2527, 2004, pages 27-40. ACM, 2004.
    • Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry L. Peterson. Characteristics of internet background radiation. In Alfio Lombardo and James F. Kurose, editors, Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004, Taormina, Sicily, Italy, October 2527, 2004, pages 27-40. ACM, 2004.
  • 20
    • 67649436551 scopus 로고    scopus 로고
    • Siraj A. Shaikh, Howard Chivers, Philip Nobles, Hao Chen, and John A. Clark. A deployment value model for intrusion detection sensors. The 3rd International Conference on Information Security and Assurance, June 25-27, 2009, Seoul, Korea. 5576 of the LNCS. Pages 250259. Springer.
    • Siraj A. Shaikh, Howard Chivers, Philip Nobles, Hao Chen, and John A. Clark. A deployment value model for intrusion detection sensors. The 3rd International Conference on Information Security and Assurance, June 25-27, 2009, Seoul, Korea. Volume 5576 of the LNCS. Pages 250259. Springer.
  • 26
    • 55349101217 scopus 로고    scopus 로고
    • Optimal ids sensor placement and alert prioritization using attack graphs
    • Noel S., and Jajodia S. Optimal ids sensor placement and alert prioritization using attack graphs. Journal of Network and Systems Management 16 3 (September 2008) 259-275
    • (2008) Journal of Network and Systems Management , vol.16 , Issue.3 , pp. 259-275
    • Noel, S.1    Jajodia, S.2
  • 29
    • 0033718255 scopus 로고    scopus 로고
    • Using model checking to analyze network vulnerabilities
    • IEEE Computer Society
    • R. W. Ritchey and P. Ammann. Using model checking to analyze network vulnerabilities. In IEEE Symposium on Security and Privacy, pages 156-165. IEEE Computer Society, 2000.
    • (2000) IEEE Symposium on Security and Privacy , pp. 156-165
    • Ritchey, R.W.1    Ammann, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.