메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 62-75

Anomaly detection using call stack information

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; SIGNAL DETECTION;

EID: 70349100099     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199328     Document Type: Conference Paper
Times cited : (122)

References (20)
  • 1
    • 65349145047 scopus 로고    scopus 로고
    • Using Programmer-Written Compiler Extensions to Catch Security Holes
    • Oakland, CA
    • K. Ashcraft and D.R. Engler, "Using Programmer-Written Compiler Extensions to Catch Security Holes", IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
    • (2002) IEEE Symposium on Security and Privacy
    • Ashcraft, K.1    Engler, D.R.2
  • 6
    • 85084160308 scopus 로고    scopus 로고
    • A study in using neural networks for anomaly and misuse detection
    • A. Ghosh and A. Schwartzbard, "A study in using neural networks for anomaly and misuse detection", 8th USENIX Security Symposium, pp. 141-151, 1999.
    • (1999) 8th USENIX Security Symposium , pp. 141-151
    • Ghosh, A.1    Schwartzbard, A.2
  • 8
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion Detection System Using Sequences of System Calls
    • S.A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion Detection System Using Sequences of System Calls", Journal of Computer Security, 6(3), pp. 151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Somayaji, A.2    Forrest, S.3
  • 10
    • 0028714365 scopus 로고
    • Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring
    • Orlando, Fl
    • C. Ko, G. Fink and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring", 10th Computer Security Applications Conference, Orlando, Fl, pp.134-144, 1994.
    • (1994) 10th Computer Security Applications Conference , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 11
    • 85084163349 scopus 로고    scopus 로고
    • Data Mining Approaches for Intrusion Detection
    • San Antonio, TX
    • W. Lee and S. Stolfo, "Data Mining Approaches for Intrusion Detection", 7th USENIX Security Symposium, San Antonio, TX, 1998.
    • (1998) 7th USENIX Security Symposium
    • Lee, W.1    Stolfo, S.2
  • 14
    • 0031684427 scopus 로고    scopus 로고
    • Combinatorial Pattern Discovery in Biological Sequences: The TEIRESIAS Algorithm
    • I. Rigoutsos and A. Floratos, "Combinatorial Pattern Discovery in Biological Sequences: The TEIRESIAS Algorithm", Bioinformatics, 14(1), pp. 55-67, 1998.
    • (1998) Bioinformatics , vol.14 , Issue.1 , pp. 55-67
    • Rigoutsos, I.1    Floratos, A.2
  • 15
    • 77952265719 scopus 로고    scopus 로고
    • The Process of Security
    • April
    • B. Schneier, "The Process of Security", Information Security, April, 2000, http://www.infosecuritymag.com/articles/april00/columns cryptorhythms.shtml.
    • (2000) Information Security
    • Schneier, B.1
  • 20
    • 84944248021 scopus 로고    scopus 로고
    • Intrusion Detection Using Variable-Length Audit Trail Patterns
    • 3rd International Workshop on the Recent Advances in Intrusion Detection , Springer
    • A. Wespi, M. Dacier and H. Debar, "Intrusion Detection Using Variable-Length Audit Trail Patterns", 3rd International Workshop on the Recent Advances in Intrusion Detection , LNCS 1907, Springer, pp. 110-129, 2000.
    • (2000) LNCS , vol.1907 , pp. 110-129
    • Wespi, A.1    Dacier, M.2    Debar, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.