메뉴 건너뛰기




Volumn 18, Issue 4, 2010, Pages 277-290

A survey of intrusion detection and prevention systems

Author keywords

Data security; Information management; Risk management

Indexed keywords

AUTONOMIC COMPUTING; COMPLEX DIMENSIONS; DATA FLOW; DATA SECURITY; DESIGN/METHODOLOGY/APPROACH; DETECTION MECHANISM; FAULT-TOLERANT SYSTEMS; HARDWARE AND SOFTWARE; INFORMATION BASIS; INFORMATION EXCHANGES; INFORMATION MANAGEMENT SYSTEMS; INFORMATION SECURITY; INFORMATION SECURITY SYSTEMS; INTELLIGENT TECHNIQUES; INTRUSION DETECTION AND PREVENTION SYSTEMS; INTRUSION EVENTS; LOCAL NETWORKS; MACHINE-LEARNING; MALWARES; SECURITY AND PRIVACY; SECURITY INCIDENT; SECURITY MEASURE; STATE OF THE ART; WEB APPLICATION; WIRED AND WIRELESS COMMUNICATIONS;

EID: 78049513508     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685221011079199     Document Type: Article
Times cited : (94)

References (33)
  • 1
    • 78049502985 scopus 로고    scopus 로고
    • available at:, accessed 7 November 2009
    • Adams, J. (2009), "CheckFree's hack attack has a long tail", available at: www.americanbanker.com/btn-issues/22-1/-370036-1.html (accessed 7 November 2009).
    • (2009) CheckFree's Hack Attack Has A Long tail
    • Adams, J.1
  • 2
    • 78049507514 scopus 로고    scopus 로고
    • Hacker attacks Ceridian; data from 27, 000 at risk
    • available at:, accessed 28 February 2010
    • Alexander, S. (2010), "Hacker attacks Ceridian; data from 27, 000 at risk", Star Tribune, available at: www.startribune.com/business/83505102. html (accessed 28 February 2010).
    • (2010) Star Tribune
    • Alexander, S.1
  • 4
    • 78049500644 scopus 로고    scopus 로고
    • available at:, accessed 16 October 2009
    • Beal, V. (2005), "Intrusion detection (IDS) and prevention (IPS) systems", available at: www.webopedia.com/DidYouKnow/Computer-Science/2005/ intrusion-detection-prevention.asp (accessed 16 October 2009).
    • (2005) Intrusion Detection (IDS) and Prevention (IPS) systems
    • Beal, V.1
  • 7
    • 58149102322 scopus 로고    scopus 로고
    • University of California, California, CA, available at
    • Brown, D. J., Suckow, B. and Wang, T. (2002), A Survey of Intrusion Detection Systems, University of California, California, CA, available at: cseweb.ucsd.edu/classes/fa01/cse221/projects/group10.pdf
    • (2002) A Survey of Intrusion Detection Systems
    • Brown, D.J.1    Suckow, B.2    Wang, T.3
  • 8
  • 10
    • 78049509703 scopus 로고    scopus 로고
    • available at:, accessed 12 November 2009
    • Coen, J. (2009), "AT&T temp charged with stealing worker info", available at: www.chicagobreakingnews.com/2009/07/att-temp-charged- with-stealing-co-worker-info.html (accessed 12 November 2009).
    • (2009) AT&T Temp Charged with Stealing Worker info
    • Coen, J.1
  • 11
    • 78049513242 scopus 로고    scopus 로고
    • available at:, accessed 12 November 2009
    • Dayal, P. (2009), "Hackers gained access to UMass info", available at: www.telegram.com/article/20090821/NEWS/908210393/1116 (accessed 12 November 2009).
    • (2009) Hackers Gained Access to UMass info
    • Dayal, P.1
  • 12
    • 78049525475 scopus 로고    scopus 로고
    • available at:, accessed 12 November 2009
    • Ferreri, E. (2009), "Hacker breaks into research study data", available at: www.charlotteobserver.com/2009/09/25/967722/hacker-breaks-into- research-study.html (accessed 12 November 2009).
    • (2009) Hacker Breaks Into Research Study data
    • Ferreri, E.1
  • 19
    • 78049525474 scopus 로고    scopus 로고
    • available at:, accessed 12 November 2009
    • Krebs, B. (2009a), "Data breach highlights roleofmoney mules", available at: voices.washingtonpost.com/securityfix/2009/09/money-mules-carry- loot-for-org.html?wprss=securityfix (accessed 12 November 2009).
    • (2009) Data Breach Highlights Roleofmoney mules
    • Krebs, B.1
  • 21
    • 78049515112 scopus 로고    scopus 로고
    • available at:, accessed 12 November 2009
    • Krebs, B. (2009c), "PayChoice suffers another data breach", available at: voices.washingtonpost.com/securityfix/2009/10/paychoice-suffers- another-data.html (accessed 12 November 2009).
    • (2009) PayChoice Suffers Another Data breach
    • Krebs, B.1
  • 23
    • 78049498929 scopus 로고    scopus 로고
    • available at:, accessed 9 November 2009
    • McMillan, R. (2009), "Symantec warns customers of call center theft", available at: www.csoonline.com/article/487372/Symantec-Warns- Customers-of-Call-Center-Theft (accessed 9 November 2009).
    • (2009) Symantec Warns Customers of Call Center theft
    • McMillan, R.1
  • 24
    • 78049487757 scopus 로고    scopus 로고
    • available at:, accessed 7 November 2009
    • MacRonin, P. (2009), "Kaspersky database exposed", available at: www.privacydigest.com/2009/02/09/kaspersky%20database%20exposed (accessed 7 November 2009).
    • (2009) Kaspersky Database exposed
    • MacRonin, P.1
  • 25
  • 27
    • 78049488410 scopus 로고    scopus 로고
    • available at:, accessed 15 November 2009
    • Moscaritolo, A. (2009), "Army special forces document leaked on P2P network", available at: www.scmagazineus.com/Army-Special-Forces-document- leaked-on-P2P-network/article/151309/(accessed 15 November 2009).
    • (2009) Army Special Forces Document Leaked on P2P network
    • Moscaritolo, A.1
  • 29
    • 77954804880 scopus 로고    scopus 로고
    • Concept of mobile agent-based electronic marketplace - Safety measure
    • I. Lee IGI Global Publications Ed., Business Science Reference, release date: February 2010
    • Patel, A. (2010), "Concept of mobile agent-based electronic marketplace - safety measure", in I. Lee (IGI Global Publications) (Ed.), Encyclopedia of E-Business Development and Management in the Digital Economy, Vol. 1, Business Science Reference, pp. 252-64 (release date: February 2010).
    • (2010) Encyclopedia of E-Business Development and Management in the Digital Economy , vol.1 , pp. 252-264
    • Patel, A.1
  • 30
    • 77954499201 scopus 로고    scopus 로고
    • Guide to intrusion detection and prevention systems (IDPS)
    • National Institute of Standards and Technology, Maryland
    • Scarfone, K. and Mell, P. (2007), "Guide to intrusion detection and prevention systems (IDPS) ", Recommendations of the National Institute of Standards and Technology, National Institute of Standards and Technology, Maryland.
    • (2007) Recommendations of the National Institute of Standards and Technology
    • Scarfone, K.1    Mell, P.2
  • 31
    • 78049517117 scopus 로고    scopus 로고
    • available at:, accessed 16 February 2010
    • Schackne, B. (2009), "Records of 30, 000 at Penn State hacked", available at: www.post-gazette.com/pg/09363/1024361-100.stm (accessed 16 February 2010).
    • (2009) Records of 30, 000 at Penn State hacked
    • Schackne, B.1
  • 32
    • 78049494145 scopus 로고    scopus 로고
    • NY tax worker accused of stealing taxpayers'
    • available at:, accessed 12 November 2009
    • Virtanen, M. (2009), "NY tax worker accused of stealing taxpayers'", IDs. ABC News, available at: abcnews.go.com/US/wireStory?id= 7402108 (accessed 12 November 2009).
    • (2009) IDs. ABC News
    • Virtanen, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.