메뉴 건너뛰기




Volumn , Issue , 2003, Pages 88-97

Designing and implementing a family of intrusion detection systems

Author keywords

intrusion detection; object oriented frameworks; program families; security

Indexed keywords

AD HOC APPROACH; ATTACK MODEL; DISTRIBUTED APPLICATIONS; EVENT STREAMS; HETEROGENEOUS ENVIRONMENTS; INTRUSION DETECTION SYSTEMS; MALICIOUS BEHAVIOR; MODELING FEATURES; MODELING LANGUAGES; NETWORKED SYSTEMS; OBJECT-ORIENTED FRAMEWORKS; PROGRAM FAMILIES; PROGRAM FAMILY; SOFTWARE FAMILY;

EID: 77954507857     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/940071.940084     Document Type: Conference Paper
Times cited : (26)

References (30)
  • 3
    • 0006064357 scopus 로고    scopus 로고
    • Addendum to "Testing and Evaluating Computer Intrusion Detection Systems"
    • September
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Addendum to "Testing and Evaluating Computer Intrusion Detection Systems". CACM, 42(9):15, September 1999.
    • (1999) CACM , vol.42 , Issue.9 , pp. 15
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 4
    • 84966620150 scopus 로고    scopus 로고
    • Testing and Evaluating Computer Intrusion Detection Systems
    • July
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Testing and Evaluating Computer Intrusion Detection Systems. CACM, 42(7):53-61, July 1999.
    • (1999) CACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 5
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An Attack Language for State-based Intrusion Detection
    • S. Eckmann, G. Vigna, and R. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71-104, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 7
    • 0003892692 scopus 로고
    • Master's thesis, Computer Science Department, University of California, Santa Barbara, July
    • K. Ilgun. USTAT: A Real-time Intrusion Detection System for UNIX. Master's thesis, Computer Science Department, University of California, Santa Barbara, July 1992.
    • (1992) USTAT: A Real-time Intrusion Detection System for UNIX
    • Ilgun, K.1
  • 9
    • 0029267472 scopus 로고
    • State Transition Analysis: A Rule-Based Intrusion Detection System
    • March
    • K. Ilgun, R. Kemmerer, and P. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 13
    • 33744663101 scopus 로고    scopus 로고
    • August
    • ISS. Realsecure 7.0. http://www.iss.net/, August 2002.
    • (2002) Realsecure 7.0
  • 21
    • 0004024262 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector routing
    • C. Perkins, editor, Addison-Wesley
    • C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. In C. Perkins, editor, Ad hoc Networking. Addison-Wesley, 2000.
    • (2000) Ad Hoc Networking
    • Perkins, C.1    Royer, E.2
  • 30
    • 84947584002 scopus 로고    scopus 로고
    • Designing a Web of Highly-Configurable Intrusion Detection Sensors
    • th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), Davis, CA, October 2001. Springer-Verlag
    • th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 69-84, Davis, CA, October 2001. Springer-Verlag.
    • LNCS , vol.2212 , pp. 69-84
    • Vigna, G.1    Kemmerer, R.2    Blix, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.