메뉴 건너뛰기




Volumn , Issue , 2005, Pages 164-177

Combining static analysis and dynamic learning to build accurate intrusion detection models

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; AUTOMATA THEORY; INTRUSION DETECTION;

EID: 79956223384     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (21)
  • 8
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • K. Ilgun, R. Kemmerer, and P. Porras. State transition analysis: a rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 10
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • San Antonio, Texas
    • W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In Proceedings: USENIX Security Symposium, pages 79-94, San Antonio, Texas, 1998.
    • (1998) Proceedings: USENIX Security Symposium , pp. 79-94
    • Lee, W.1    Stolfo, S.J.2
  • 13
    • 0033295259 scopus 로고    scopus 로고
    • BrO: A system for detecting network intruders in real-time
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Network, 31(23), 1999.
    • (1999) Computer Network , vol.31 , Issue.23
    • Paxson, V.1
  • 14
    • 0034829697 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • Oakland, California, IEEE Computer Society
    • R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In Proceedings: IEEE Symposium on Security and Privacy, pages 144-155, Oakland, California, 2001. IEEE Computer Society.
    • (2001) Proceedings: IEEE Symposium on Security and Privacy , pp. 144-155
    • Sekar, R.1    Bendre, M.2    Dhurjati, D.3    Bollineni, P.4
  • 15
    • 85084164032 scopus 로고    scopus 로고
    • Automated response using system-call delays
    • Denver, Colorado
    • A. Somayaji. Automated response using system-call delays. In Proceedings: USENIX Security Symposium, pages 185-197, Denver, Colorado, 2000.
    • (2000) Proceedings: USENIX Security Symposium , pp. 185-197
    • Somayaji, A.1
  • 16
    • 84880858814 scopus 로고    scopus 로고
    • Why 6?” Defining the operational limits of stide, an anomaly-based intrusion detector
    • Berkeley, California, IEEE Computer Society
    • K. M. Tan and R. A. Maxion. “Why 6?” Defining the operational limits of stide, an anomaly-based intrusion detector. In Proceedings: IEEE Symposium on Security and Privacy, pages 173-186, Berkeley, California, 2002. IEEE Computer Society.
    • (2002) Proceedings: IEEE Symposium on Security and Privacy , pp. 173-186
    • Tan, K.M.1    Maxion, R.A.2
  • 18
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • Oakland, California, IEEE Computer Society
    • D. Wagner and D. Dean. Intrusion detection via static analysis. In Proceedings: IEEE Symposium on Security and Privacy, pages 156-169, Oakland, California, 2001. IEEE Computer Society.
    • (2001) Proceedings: IEEE Symposium on Security and Privacy , pp. 156-169
    • Wagner, D.1    Dean, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.