메뉴 건너뛰기




Volumn 13, Issue 4, 2010, Pages

Storage-based intrusion detection

Author keywords

Intrusion detection; Storage

Indexed keywords

AUDIT LOGS; BACKDOORS; DATA ACCESS PATTERNS; INTRUSION DETECTION SYSTEMS; OPERATING SYSTEMS; STORAGE; STORAGE DEVICES; STORAGE SYSTEMS; STORAGE-BASED INTRUSION DETECTION; TROJAN HORSE;

EID: 78651392217     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1880022.1880024     Document Type: Article
Times cited : (10)

References (50)
  • 1
    • 0004309520 scopus 로고    scopus 로고
    • Tech. rep. 98-17, Department of Computer Engineering, Chalmers University of Technology
    • AXELSSON, S. 1998. Research in intrusion-detection systems: A survey. Tech. rep. 98-17, Department of Computer Engineering, Chalmers University of Technology.
    • (1998) Research in Intrusion-detection Systems: A Survey
    • Axelsson, S.1
  • 3
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • BISHOP, M. AND DILGER, M. 1996. Checking for race conditions in file accesses. Comput. Syst. 9, 2, 131-152.
    • (1996) Comput. Syst. , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 11
    • 0345914404 scopus 로고    scopus 로고
    • What are MACtimes?
    • FARMER, D. 2000. What are MACtimes? Dr. Dobb's J. 25, 10, 68-74.
    • (2000) Dr. Dobb's J. , vol.25 , Issue.10 , pp. 68-74
    • Farmer, D.1
  • 23
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • IEEE
    • KO, C., RUSCHITZKA, M., AND LEVITT, K. 1997. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 175-187.
    • (1997) Proceedings of the IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 28
    • 78651380345 scopus 로고    scopus 로고
    • NFR 2002. Nfr security. http://www.nfr.net/.
    • (2002) Nfr Security
  • 29
    • 78651387601 scopus 로고    scopus 로고
    • PACKETSTORM 2009. Packet storm security. http://www.packetstormsecurity. org/.
    • (2009) Packetstorm
  • 32
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • USENIX Association
    • PAXSON, V. 1998. Bro: A system for detecting network intruders in real-time. In Proceedings of the USENIX Security Symposium. USENIX Association, 31-51.
    • (1998) Proceedings of the USENIX Security Symposium , pp. 31-51
    • Paxson, V.1
  • 39
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • SCHNEIER, B. AND KELSEY, J. 1999. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur. 2, 2, 159-176.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 46
    • 78651383686 scopus 로고    scopus 로고
    • TRIPWIRE. 2002. Tripwire open souce 2.3.1. http://ftp4.sf.net/ sourceforge/tripwire/tripwire-2.3.1-2.tar.gz.
    • (2002) Tripwire Open Souce 2.3.1.
  • 47
    • 0034832697 scopus 로고    scopus 로고
    • Analysis and implementation of software rejuvenation in cluster systems
    • VAIDYANATHAN, K., HARPER, R. E., HUNTER, S. W., AND TRIVEDI, K. S. 2002. Analysis and implementation of software rejuvenation in cluster systems. Perform. Eval. Rev. 29, 1, 62-71.
    • (2002) Perform. Eval. Rev. , vol.29 , Issue.1 , pp. 62-71
    • Vaidyanathan, K.1    Harper, R.E.2    Hunter, S.W.3    Trivedi, K.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.