메뉴 건너뛰기




Volumn , Issue , 2010, Pages 595-598

The design and implementation of host-based intrusion detection system

Author keywords

BP neural network; HIDS; Intrusion detection; Intrusion detection system; Log analysis; OSSEC

Indexed keywords

ANOMALY DETECTION; BP NEURAL NETWORK; BP NEURAL NETWORKS; COMMUNICATION RESOURCES; DETECTION TECHNOLOGY; HOST-BASED INTRUSION DETECTION SYSTEM; INFORMATION ASSURANCE; INTRUSION DETECTION SYSTEMS; LOG ANALYSIS; LOG-FILE ANALYSIS; MISUSE DETECTION; TARGET SYSTEMS;

EID: 77952683499     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IITSI.2010.127     Document Type: Conference Paper
Times cited : (49)

References (9)
  • 3
    • 83455243918 scopus 로고    scopus 로고
    • Host-based Intrusion Detection Systems
    • John Wiley & Sons, December
    • G. Vigna and C. Kruegel, "Host-based Intrusion Detection Systems," in The Handbook of Information Security, Volume III, John Wiley & Sons, December 2005.
    • (2005) The Handbook of Information Security , vol.3
    • Vigna, G.1    Kruegel, C.2
  • 5
    • 77952688558 scopus 로고    scopus 로고
    • Daniel B. Cid, OSSEC[OL], 2008, http://www.ossec.net.
    • (2008)
    • Cid, D.B.1
  • 9
    • 24944525903 scopus 로고    scopus 로고
    • A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images
    • Advances in Neural Networks, Intl. Symp. Neural Networks Proc., Part II
    • Lian, S., G. Chen, A. Cheung and Z. Wang, 2004. A chaotic-neural-network- based encryption algorithm for JPEG2000 encoded images.Advances in Neural Networks, Intl. Symp. Neural Networks Proc., Part II, Lecture Notes in Computer Science, 3174,pp.627-632.
    • (2004) Lecture Notes in Computer Science , vol.3174 , pp. 627-632
    • Lian, S.1    Chen, G.2    Cheung, A.3    Wang, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.