메뉴 건너뛰기




Volumn 65, Issue 4, 2011, Pages 611-624

Current intrusion detection techniques in information technology - A detailed analysis

Author keywords

Intrusion detection; Misuse and anomaly detection; Security; Taxonomy

Indexed keywords


EID: 83455235904     PISSN: 1450216X     EISSN: 1450202X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (33)
  • 3
    • 34548192255 scopus 로고
    • CERT Coordination Center, Available by anonymous ftp from ftp.cert.org October
    • CERT Coordination Center, Syslog vulnerability-A workaround for sendmail. Available by anonymous ftp from ftp.cert.org (October 1995).
    • (1995) Syslog Vulnerability-A Workaround for Sendmail
  • 4
    • 0342867253 scopus 로고
    • Computer intrusion detection: A comparative survey
    • Technical Report 95-07, University of Wollongong, NSW 2522, Australia May
    • Mansour Esmaili, Rei Safavi-Naini and Josef Pieprzyk, Computer intrusion detection: A comparative survey, Technical Report 95-07, Center for Computer Security Research, University of Wollongong, NSW 2522, Australia (May 1995).
    • (1995) Center for Computer Security Research
    • Esmaili, M.1    R. Safavi-Naini2    Pieprzyk, J.3
  • 5
    • 0343302301 scopus 로고
    • Available from May
    • Dan Farmer, Cops overview, Available from http://www.trouble.org/cops/ overview.html (May 1993).
    • (1993) Cops Overview
    • Farmer, D.1
  • 7
    • 0013193905 scopus 로고
    • The cops security checker system
    • Anaheim, CA, June
    • Daniel Farmer and Eugene Spaffors, The cops security checker system, Proc. Summer USENIX Conference (Anaheim, CA, June 1990) 165-170.
    • (1990) Proc. Summer USENIX Conference , pp. 165-170
    • Farmer, D.1    Spaffors, E.2
  • 9
    • 0003200953 scopus 로고
    • Artificial intelligence and intrusion detection: Current and future directions
    • Baltimore, MD, October
    • Jeremy Frank, Artificial intelligence and intrusion detection: Current and future directions, Proc. 17th National Computer Security Conference (Baltimore, MD, October 1994).
    • (1994) Proc 17th National Computer Security Conference
    • Frank, J.1
  • 11
    • 83455245675 scopus 로고    scopus 로고
    • Haystack Labs Inc.Available from the company's website at
    • Haystack Labs, Inc. Sytalker, Available from the company's website at http://www.haystak.com/stalk.html (1997).
    • (1997) Sytalker
  • 13
    • 83455203030 scopus 로고    scopus 로고
    • Internet Security Systems Inc
    • Internet Security Systems, Inc. RealSecure, Internet http://www.iss.net/ prod/rsds.html (1997).
    • (1997) Real Secure Internet
  • 16
    • 0742265703 scopus 로고
    • Next generation intrusion detection expert system (NIDES) 1. Statistical algorithms rationale
    • Technical Report A016 Rationales, SRI International, 333 Ravenwood Aveneue, Menlo Park, CA (March
    • Harold S.Javitz, Alfonso Valdez, Teresa F. Lunt, Ann Tamaru, Marby Tyson and John Lowrance, Next generation intrusion detection expert system (NIDES). 1. Statistical algorithms rationale. 2. Rationale for proposed resolver, Technical Report A016 Rationales, SRI International, 333 Ravenwood Aveneue, Menlo Park, CA (March 1993).
    • (1993) Rationale for Proposed Resolver
    • Javitz, H.S.1    Valdez, A.2    Lunt, T.F.3    Tamaru, A.4    Tyson, M.5    Lowrance, J.6
  • 18
    • 84988573115 scopus 로고
    • The design and implementation of tripwire: A file system integrity checker
    • Jacques Stern, ed.,ACM Press, COAST, Purdue, November
    • Gene H. Kim and Eugene H. Spafford, The design and implementation of tripwire: A file system integrity checker, in: Jacques Stern, ed., 2nd ACM Conference on Computer and Communications Security (ACM Press, COAST, Purdue, November 1994) 18-29.
    • (1994) 2nd ACM Conference on Computer and Communications Security , pp. 18-29
    • Kim, G.H.1    Spafford, E.H.2
  • 20
    • 0003111439 scopus 로고
    • Automated audit trial analysis and intrusion detection: A survey
    • Baltimore, MD, October
    • Teresa F. Lunt, Automated audit trial analysis and intrusion detection: A survey, Proc. 11th National Computer Security Conference (Baltimore, MD, October 1988).
    • (1988) Proc. 11th National Computer Security Conference
    • Lunt, T.F.1
  • 21
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • June
    • Teresa F. Lunt, A survey of intrusion detection techniques, Computers & Security, 12(4) (June 1993) 405-418.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 23
    • 0343302296 scopus 로고    scopus 로고
    • Network Associates Inc. Available from the company's website at
    • Network Associates Inc., Cybercop scanner, Available from the company's website at http://www.nai.com/products/security/ballista/default.asp (1998).
    • (1998) Cybercop Scanner
  • 24
    • 83455203029 scopus 로고    scopus 로고
    • Network Associates Inc. Available from the company's website at
    • Network Associates Inc., Cybercop server, Available from the company's website at http://www.nai.com/products/secueity/cybercopsvr/index.asp (1998).
    • (1998) Cybercop Server
  • 26
    • 85094814712 scopus 로고
    • The tamu security package: An ongoing response to internet intruders in an academic environment
    • Santa Clara, CA, October
    • David R. Safford, Douglas Lee Schales and David K. Hess, The tamu security package: An ongoing response to internet intruders in an academic environment, Proc. 4th USENIX Security Symposium (Santa Clara, CA, October 1993) 91-118.
    • (1993) Proc. 4th USENIX Security Symposium , pp. 91-118
    • Safford, D.R.1    Schales, D.L.2    Hess, D.K.3
  • 27
    • 83455178582 scopus 로고    scopus 로고
    • Secure Networks Inc. Available from the company's website at
    • Secure Networks, Inc. Ballista security auditing system, Available from the company's website at http://www/securenetworks.com/ballista/ballista.html (1997).
    • (1997) Ballista Security Auditing System
  • 33
    • 83455245674 scopus 로고    scopus 로고
    • WheelGroup Corporation, available from the company's website at
    • WheelGroup Corporation, Brochure of the netranger intrusion detection system, available from the company's website at http://www/wheelgroup.com/ netrangr/netranger-broch.html.
    • Brochure of the Netranger Intrusion Detection System


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.