메뉴 건너뛰기




Volumn 1, Issue 3-4, 2006, Pages 206-217

An adaptive expert system approach for intrusion detection

Author keywords

adaptive expert systems; computer security; fuzzy sets; intruder detection

Indexed keywords


EID: 77955290752     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.011780     Document Type: Article
Times cited : (26)

References (30)
  • 1
    • 84952952709 scopus 로고    scopus 로고
    • Intrusion detection systems stymie network hackers
    • Anonymous (2000) ‘Intrusion detection systems stymie network hackers’, Security, Vol. 37, No. 7, pp.58–60.
    • (2000) Security , vol.37 , Issue.7 , pp. 58-60
    • Anonymous1
  • 5
    • 77954749297 scopus 로고    scopus 로고
    • Proactive intrusion detection and SNMP – based security management: new experiments and validation
    • Cabrera, J.B.D., Lewis, L.M., Qin, X., Gutierrez, C., Lee, W. and Mehra, R.K. (2003) ‘Proactive intrusion detection and SNMP – based security management: new experiments and validation’, Integrated Network Management, pp.93–96.
    • (2003) Integrated Network Management , pp. 93-96
    • Cabrera, J.B.D.1    Lewis, L.M.2    Qin, X.3    Gutierrez, C.4    Lee, W.5    Mehra, R.K.6
  • 7
    • 0028742960 scopus 로고
    • Intrusion detection: approach and performance issues of the SECURENET system
    • Denault, M., Gritzalis, D., Karagiannis, D. and Spirakis, P. (1994) ‘Intrusion detection: approach and performance issues of the SECURENET system’, Computers and Security, Vol. 13, pp.495–508.
    • (1994) Computers and Security , vol.13 , pp. 495-508
    • Denault, M.1    Gritzalis, D.2    Karagiannis, D.3    Spirakis, P.4
  • 11
    • 85084160767 scopus 로고    scopus 로고
    • On gray – box program tracking for anomaly detection
    • August, San Diego, CA
    • Gao, D., Reiter, M.K. and Song, D. (2004) ‘On gray – box program tracking for anomaly detection’, Thirteenth USEIX Security Symposium, August, San Diego, CA, pp.9–13.
    • (2004) Thirteenth USEIX Security Symposium , pp. 9-13
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 13
    • 84964526751 scopus 로고    scopus 로고
    • Extending the DARPA off-line intrusion detection evaluation
    • June, Anaheim, CA
    • Haines, J.W., Rossey, L.M. and Lippmann, R.P. (2001) ‘Extending the DARPA off-line intrusion detection evaluation’, Proceedings of DISCEX, June, Anaheim, CA, pp.11–12.
    • (2001) Proceedings of DISCEX , pp. 11-12
    • Haines, J.W.1    Rossey, L.M.2    Lippmann, R.P.3
  • 15
    • 0037244227 scopus 로고    scopus 로고
    • A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
    • Iheagwara, C., Blyth, A. and Singhal, M. (2003) ‘A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment’, Journal of Computer Security, Vol. 11, No. 1, pp.1–33.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 1-33
    • Iheagwara, C.1    Blyth, A.2    Singhal, M.3
  • 16
    • 0029267472 scopus 로고
    • State transition analysis: a rule based intrusion detection system
    • Ilgun, K., Kemmerer, R.A. and Porras, P.A. (1995) ‘State transition analysis: a rule based intrusion detection system’, IEEE Transactions on Software Engineering, Vol. 21, No. 3, pp.181–189.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-189
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 17
    • 0036090464 scopus 로고    scopus 로고
    • Using internal sensors and embedded detectors for intrusion detection
    • Kerschbaum, F., Spafford, E.H. and Zamboni, D. (2002) ‘Using internal sensors and embedded detectors for intrusion detection’, Journal of Computer Security, Vol. 11, Nos. 1/2, pp.23–70.
    • (2002) Journal of Computer Security , vol.11 , Issue.1-2 , pp. 23-70
    • Kerschbaum, F.1    Spafford, E.H.2    Zamboni, D.3
  • 18
    • 0033726577 scopus 로고    scopus 로고
    • Logic induction of valid behavior specifications for intrusion detection
    • May, Oakland, CA
    • Ko, C. (2000) ‘Logic induction of valid behavior specifications for intrusion detection’, IEEE Symposium on Security and Privacy, May, Oakland, CA.
    • (2000) IEEE Symposium on Security and Privacy
    • Ko, C.1
  • 19
    • 85077733517 scopus 로고    scopus 로고
    • High coverage detection of input-related security faults
    • August, Washington, DC
    • Larson, E. and Austin, T. (2003) ‘High coverage detection of input-related security faults’, Twelfth USENIX Security Symposium, August, Washington, DC, pp.4–8.
    • (2003) Twelfth USENIX Security Symposium , pp. 4-8
    • Larson, E.1    Austin, T.2
  • 21
    • 3242859958 scopus 로고
    • Expert system-user integrated adaptive systems
    • Levary, R.R. and Madeo, L.A. (1991) ‘Expert system-user integrated adaptive systems’, Expert Systems with Applications, Vol. 3, pp.489–498.
    • (1991) Expert Systems with Applications , vol.3 , pp. 489-498
    • Levary, R.R.1    Madeo, L.A.2
  • 22
    • 85084160262 scopus 로고    scopus 로고
    • Using text categorization techniques for intrusion detection
    • August, San Francisco, CA
    • Liao, Y. and Vermuti, R. (2002) ‘Using text categorization techniques for intrusion detection’, Eleventh USENIX Security Symposium, August, San Francisco, CA, pp.5–9.
    • (2002) Eleventh USENIX Security Symposium , pp. 5-9
    • Liao, Y.1    Vermuti, R.2
  • 23
    • 84940110274 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system tool set
    • May, Berkeley, CA
    • Lindqvist, U. and Porras, P.A. (1999) ‘Detecting computer and network misuse through the production-based expert system tool set’, IEEE Symposium on Security and Privacy, May, Berkeley, CA.
    • (1999) IEEE Symposium on Security and Privacy
    • Lindqvist, U.1    Porras, P.A.2
  • 27
    • 0032374128 scopus 로고    scopus 로고
    • CSI roundtable: experts discuss present and future intrusion detection systems
    • Power, R. (1998), ‘CSI roundtable: experts discuss present and future intrusion detection systems’, Computer Security Journal, Vol. XIV, No. 1, pp.1–14.
    • (1998) Computer Security Journal , vol.14 , Issue.1 , pp. 1-14
    • Power, R.1
  • 29
    • 84952954230 scopus 로고    scopus 로고
    • ChAD: Change and anomaly detection
    • Seventh ACM Conference on Computer Security, November, Athens, Greece
    • Stottler, Honke Associates, Inc. (2000) ‘ChAD: Change and anomaly detection’, Workshop on Intrusion Detection and Prevention, Seventh ACM Conference on Computer Security, November, Athens, Greece.
    • (2000) Workshop on Intrusion Detection and Prevention
  • 30
    • 34248666540 scopus 로고
    • Fuzzy sets
    • Zadeh, L. (1965) ‘Fuzzy sets’, Information and Control, Vol. 8, pp.338–353.
    • (1965) Information and Control , vol.8 , pp. 338-353
    • Zadeh, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.