메뉴 건너뛰기




Volumn , Issue , 2005, Pages 365-378

Collaborating against common enemies

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION SYSTEMS; IP ADDRESSS; LARGE DATASET; OFFLINE; REAL TIME;

EID: 79960561313     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (53)

References (29)
  • 8
    • 0343302298 scopus 로고
    • ASAX: Software architecture and rule-based language for universal audit trail analysis
    • N. Habra, B. L. Charlier, A. Mounji, and I. Mathieu. ASAX: Software architecture and rule-based language for universal audit trail analysis. In ESORICS, 1992.
    • (1992) ESORICS
    • Habra, N.1    Charlier, B.L.2    Mounji, A.3    Mathieu, I.4
  • 11
    • 84942253601 scopus 로고    scopus 로고
    • COSSACK: Coordinated suppression of simultaneous attacks
    • A. Hussain, J. Heidemann, and C. Papadopoulos. COSSACK: Coordinated Suppression of Simultaneous Attacks. In DISCEX, 2003.
    • (2003) DISCEX
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 13
    • 85084159849 scopus 로고    scopus 로고
    • Privacy-preserving sharing and correlation of security alerts
    • San Diego, CA
    • P. Lincoln, P. Porras, and V. Shmatikov. Privacy-Preserving Sharing and Correlation of Security Alerts. In Usenix Security 2004, San Diego, CA.
    • Usenix Security 2004
    • Lincoln, P.1    Porras, P.2    Shmatikov, V.3
  • 14
    • 31844451490 scopus 로고    scopus 로고
    • Collaborative distributive intrusion detection
    • M. Locasto and et al. Collaborative Distributive Intrusion Detection. In CU Tech Report CUCS-012-04, 2004.
    • (2004) CU Tech Report CUCS-012-04
    • Locasto, M.1
  • 16
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. In INFOCOM, 2003.
    • (2003) INFOCOM
    • Moore, D.1    Shannon, C.2    Voelker, G.3    Savage, S.4
  • 19
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • (Amsterdam, Netherlands: 1999)
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks (Amsterdam, Netherlands: 1999), 31(23-24):2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 21
    • 0002473030 scopus 로고
    • Distributed intrusion detection system - Motivation, architecture, and an early prototype
    • A. Snapp and et. al. Distributed intrusion detection system - motivation, architecture, and an early prototype. In Proceedings of the 14th NCSC, 1991.
    • (1991) Proceedings of the 14th NCSC
    • Snapp, A.1
  • 22
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion detection using autonomous agents
    • Z. D.
    • E. Spafford and Z. D. Intrusion detection using autonomous agents. In Computer Networks, Volume 34, 2000.
    • (2000) Computer Networks , vol.34
    • Spafford, E.1
  • 27
    • 0040749982 scopus 로고    scopus 로고
    • Cooperating security managers: Distributed intrusion detection systems
    • U. White, G. B.; Pooch. Cooperating security managers: distributed intrusion detection systems. In Computers & Security, Vol. 15, No. 5, pages 441-450, 1996.
    • (1996) Computers & Security , vol.15 , Issue.5 , pp. 441-450
    • White, U.1    Pooch, G.B.2
  • 29
    • 35048846516 scopus 로고    scopus 로고
    • Behavioral intrusion detection
    • S. Zanero. Behavioral Intrusion Detection. In ISCIS 2004.
    • ISCIS 2004
    • Zanero, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.