메뉴 건너뛰기




Volumn 5451 LNCS, Issue , 2009, Pages 360-371

Implementing IDS management on lock-keeper

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED IDS; IDS SENSORS; INTRUSION DETECTION SYSTEMS; MANAGEMENT ARCHITECTURES; PHYSICAL SEPARATION; PLUG-INS; PROPOSED ARCHITECTURES; SPECIAL HARDWARE;

EID: 70350660843     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00843-6_31     Document Type: Conference Paper
Times cited : (9)

References (25)
  • 1
    • 70350701614 scopus 로고    scopus 로고
    • Snort IDS Website (1998-2009), http://www.snort.org/
    • Snort IDS Website (1998-2009), http://www.snort.org/
  • 2
    • 70350701615 scopus 로고    scopus 로고
    • Samhain IDS Website (2001-2009), http://www.la-samhna.de/samhain/
    • Samhain IDS Website (2001-2009), http://www.la-samhna.de/samhain/
  • 3
    • 70350682931 scopus 로고    scopus 로고
    • Bro IDS Website (2003-2009), http://www.bro-ids.org/
    • Bro IDS Website (2003-2009), http://www.bro-ids.org/
  • 4
    • 70350663769 scopus 로고    scopus 로고
    • F-Secure Linux Security Website F-Secure Corporation
    • F-Secure Linux Security Website F-Secure Corporation (2006-2009), http://www.f-secure.com/linux-weblog/
    • (2006)
  • 5
    • 70350693176 scopus 로고    scopus 로고
    • Prelude IDS Website
    • Prelude IDS Website: PreludeIDS Technologies (2005-2009), http://www.prelude-ids.com/
    • (2005) PreludeIDS Technologies
  • 7
    • 35248857893 scopus 로고    scopus 로고
    • Mahoney, M.V., Chan, P.K.: An analysis of the 1999 dARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 220-237. Springer, Heidelberg (2003)
    • Mahoney, M.V., Chan, P.K.: An analysis of the 1999 dARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 220-237. Springer, Heidelberg (2003)
  • 8
    • 35248842651 scopus 로고    scopus 로고
    • Ramadas, M., Ostermann, S., Tjaden, B.C.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 36-54. Springer, Heidelberg (2003)
    • Ramadas, M., Ostermann, S., Tjaden, B.C.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 36-54. Springer, Heidelberg (2003)
  • 10
    • 33751056900 scopus 로고    scopus 로고
    • Brumley, D., Newsome, J., Song, D., et al.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the, IEEE Symposium on Security and Privacy, SP 2006, Washington, DC, USA, pp. 2-16 (2006)
    • Brumley, D., Newsome, J., Song, D., et al.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the, IEEE Symposium on Security and Privacy, SP 2006, Washington, DC, USA, pp. 2-16 (2006)
  • 12
    • 0004225165 scopus 로고    scopus 로고
    • The Intrusion Detection Message Exchange Format, Internet Draft
    • Technical Report, IETF Intrusion Detection Exchange Format Working Group July
    • Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format, Internet Draft. Technical Report, IETF Intrusion Detection Exchange Format Working Group (July 2004)
    • (2004)
    • Debar, H.1    Curry, D.2    Feinstein, B.3
  • 13
    • 38049149484 scopus 로고    scopus 로고
    • Research on the Lock-Keeper Technology: Architectures, Applications and Advancements
    • Cheng, F., Meinel, C.: Research on the Lock-Keeper Technology: Architectures, Applications and Advancements. International Journal of Computer and Information Science 5(3), 236-245 (2004)
    • (2004) International Journal of Computer and Information Science , vol.5 , Issue.3 , pp. 236-245
    • Cheng, F.1    Meinel, C.2
  • 14
    • 70350693062 scopus 로고    scopus 로고
    • Lock-Keeper Website (2003-2009), http://www.lock-keeper.org/
    • (2003) Website
  • 15
    • 77954338203 scopus 로고    scopus 로고
    • Cheng, F., Meinel, C.: Lock-Keeper: A new implementation of physical separation technology. In: Paulus, S., Pohlmann, N., Reimer, H. (eds.) Securing Electronic Business Processes: Highligths of the Information Security Solutions Europe Conference, ISSE 2006, pp. 275-286. Friedrich Vieweg & Sohn Verlag (2006)
    • Cheng, F., Meinel, C.: Lock-Keeper: A new implementation of physical separation technology. In: Paulus, S., Pohlmann, N., Reimer, H. (eds.) Securing Electronic Business Processes: Highligths of the Information Security Solutions Europe Conference, ISSE 2006, pp. 275-286. Friedrich Vieweg & Sohn Verlag (2006)
  • 17
    • 34248347086 scopus 로고    scopus 로고
    • Investigating new approaches to data collection, management and analysis for network intrusion detection
    • New York, USA, pp
    • Derrick, E.J., Tibbs, R.W., Reynolds, L.L.: Investigating new approaches to data collection, management and analysis for network intrusion detection. In: Proceedings of the 45th Annual Southeast Regional Conference, SE 2007, New York, USA, pp. 283-287 (2007)
    • (2007) Proceedings of the 45th Annual Southeast Regional Conference, SE , pp. 283-287
    • Derrick, E.J.1    Tibbs, R.W.2    Reynolds, L.L.3
  • 20
    • 70350701613 scopus 로고    scopus 로고
    • Intelligent Application Gateway (IAG) Website
    • Intelligent Application Gateway (IAG) Website: Microsoft Corporation (2006- 2009), http://www.microsoft.com/iag/
    • (2006)
  • 23
    • 70350689106 scopus 로고    scopus 로고
    • Nmap Security Scanner Website (1997-2008), http://www.nmap.org/
    • Nmap Security Scanner Website (1997-2008), http://www.nmap.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.