메뉴 건너뛰기




Volumn 4347 LNCS, Issue , 2006, Pages 222-234

High-speed intrusion detection in support of critical infrastructure protection

Author keywords

Critical information infrastructure protection (CIIP); Critical infrastructure protection (CIP); Flow monitoring; Intrusion detection; SCADA; Security management

Indexed keywords

CRITICAL INFORMATION INFRASTRUCTURE PROTECTIONS; CRITICAL INFRASTRUCTURE PROTECTION; FLOW MONITORING; SCADA; SECURITY MANAGEMENT;

EID: 80052933495     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11962977_18     Document Type: Conference Paper
Times cited : (21)

References (28)
  • 1
    • 34548114581 scopus 로고    scopus 로고
    • International CIIP (Critical Information Infrastructure Protection) Handbook, edited by A. Wenger and J. Metzger, ETH Swiss Federal Institute fo Technology Zurich, 2004
    • Dunn, M., Wigert, I., An Inventory and Analysis of Protection Policies in Fourteen Countries, International CIIP (Critical Information Infrastructure Protection) Handbook 2004, edited by A. Wenger and J. Metzger, ETH Swiss Federal Institute fo Technology Zurich, 2004.
    • (2004) An Inventory and Analysis of Protection Policies in Fourteen Countries
    • Dunn, M.1    Wigert, I.2
  • 6
    • 84885792274 scopus 로고    scopus 로고
    • Communication from the Commission to the Council and the European Parliament, Brussels, October 2004
    • Communication from the Commission to the Council and the European Parliament Critical Infrastructure Protection in the fight against terrorism COM (704)2004, Brussels, October 2004.
    • (2004) Critical Infrastructure Protection in the Fight Against Terrorism COM , Issue.704
  • 7
    • 79961179005 scopus 로고    scopus 로고
    • Critical infrastructure: Control systems and the terrorist threat
    • The Library of Congress, Febraury
    • Shea, D. A., Critical Infrastructure: Control Systems and the Terrorist Threat, in Report for Congress RL31534. The Library of Congress, Febraury 2003
    • (2003) Report for Congress RL31534
    • Shea, D.A.1
  • 11
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network based intrusion detection system
    • Vigna, G., Kemmerer, R., Netstat: a network based intrusion detection system, Journal of Computer Security, 7(1), 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.2
  • 12
    • 0037986866 scopus 로고
    • Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides)
    • Computer Science Laboratory
    • Anderson, D., Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides), Technical report, Computer Science Laboratory, 1995.
    • (1995) Technical Report
    • Anderson, D.1
  • 14
    • 0003907293 scopus 로고    scopus 로고
    • Rebecca Gurley Bace, Macmillan Technical Publishing, January
    • Rebecca Gurley Bace, Intrusion Detection, Macmillan Technical Publishing, January 2000.
    • (2000) Intrusion Detection
  • 16
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • Matthew Vincent Mahoney, Network traffic anomaly detection based on packet bytes, in Proceedings of ACM SAC 03, 2003.
    • (2003) Proceedings of ACM SAC 03
    • Mahoney, M.V.1
  • 18
    • 33845436625 scopus 로고    scopus 로고
    • Vern Paxson and Brian Terney
    • Vern Paxson and Brian Terney, Bro reference manual, 2004
    • (2004) Bro Reference Manual
  • 19
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (p-best)
    • Oakland, California, May
    • Lindqvist, U., Porras, P., A., Detecting computer and network misuse through the production-based expert system toolset (p-best), in Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 1999.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 20
  • 25
    • 84885712795 scopus 로고    scopus 로고
    • Correlation between netflow system and network views for intrusion detection
    • Counter-terrorism, and Privacy held in conjunction with SDM
    • Abad, C., Li Y., Lakkaraju, K., Yin, X., Yurcik, W., Correlation between netflow system and network views for intrusion detection, in Proceedings of Workshop on Link Analysis, Counter-terrorism, and Privacy held in conjunction with SDM 2004.
    • (2004) Proceedings of Workshop on Link Analysis
    • Abad, C.1    Li, Y.2    Lakkaraju, K.3    Yin, X.4    Yurcik, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.