메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 230-235

Modeling and analyzing dynamic forensics system based on intrusion tolerance

Author keywords

Intrusion deception; Intrusion tolerance; Network forensics; Semi Markov process

Indexed keywords

COMPUTER FORENSICS; EMBEDDED MARKOV CHAIN; FINITE STATE MACHINES; HONEYPOTS; INTRUSION DECEPTION; INTRUSION TOLERANCE; NETWORK FORENSICS; ON DYNAMICS; PROACTIVE DEFENSE; SEMI MARKOV PROCESS; SERVER SYSTEM; SYSTEM-BASED; TRANSITION MODEL;

EID: 73549108733     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2009.108     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 77951160522 scopus 로고    scopus 로고
    • A Road Map for Digital Forensics Research, technical Report
    • Digital Forensics Research Workshop, November
    • Digital Forensics Research Workshop. "A Road Map for Digital Forensics Research, technical Report", DFRWS, November 2001, pp. 15-20
    • (2001) DFRWS , pp. 15-20
  • 3
    • 73549123347 scopus 로고    scopus 로고
    • The Application of Intrusion Detection Systems in a Forensic Environment
    • Toulouse, France
    • Peter Stephenson. "The Application of Intrusion Detection Systems in a Forensic Environment" . Proceedings of the RAID2000 Conference, Toulouse, France, 2000.
    • (2000) Proceedings of the RAID2000 Conference
    • Stephenson, P.1
  • 4
    • 62349088478 scopus 로고    scopus 로고
    • Realtime Intrusion-forensics, a First Prototype Implementation
    • Udo Payer. "Realtime Intrusion-forensics, a First Prototype Implementation" . TERENA Networking Conference, 2004.
    • (2004) TERENA Networking Conference
    • Payer, U.1
  • 8
    • 73549088405 scopus 로고    scopus 로고
    • Maintaining Forensic Evidence for Law Enforcement Agencies form a Federation of Decoy Networks
    • Barbara Jones Redmon. "Maintaining Forensic Evidence for Law Enforcement Agencies form a Federation of Decoy Networks" (CCIPS) [EB/OL]. http://www.cybercrime.gov /searching.html.
    • (CCIPS) [EB/OL]
    • Jones Redmon, B.1
  • 9
    • 12444310121 scopus 로고    scopus 로고
    • Research on Intrusion-Deception-Based Dynamic Network Defense
    • Xia C H, Li X J, Zhao Q P. "Research on Intrusion-Deception-Based Dynamic Network Defense", Cinese Journal of computers, 2004, Vol. 27, No.12, 1585-1592
    • (2004) Cinese Journal of computers , vol.27 , Issue.12 , pp. 1585-1592
    • Xia, C.H.1    Li, X.J.2    Zhao, Q.P.3
  • 12
    • 73549103936 scopus 로고    scopus 로고
    • Design of Network Forensic System Based on Intrusion Tolerance
    • Zhang Y D, Jiang B, Wang J D. "Design of Network Forensic System Based on Intrusion Tolerance". Computer Engineering, 2007, vol 33, No. 19, 161-163
    • (2007) Computer Engineering , vol.33 , Issue.19 , pp. 161-163
    • Zhang, Y.D.1    Jiang, B.2    Wang, J.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.