메뉴 건너뛰기




Volumn 38, Issue , 2008, Pages 1-16

Approaches in anomaly-based network intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84855688895     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-77265-3_1     Document Type: Article
Times cited : (10)

References (29)
  • 1
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Publishing Co., Inc
    • Bace, R.: Intrusion detection. Macmillan Publishing Co., Inc. (2000)
    • (2000) Intrusion Detection
    • Bace, R.1
  • 2
    • 0034226287 scopus 로고    scopus 로고
    • A Revised Taxonomy of Intrusion-Detection Systems
    • Debar, H., Dacier, M., Wespi, A.: A Revised Taxonomy of Intrusion-Detection Systems. Annales des T́eĺecommunications 55(7-8) (2000) 361-378
    • (2000) Annales Des T́eĺecommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 5
    • 84882760438 scopus 로고    scopus 로고
    • Sourcefire: Snort Network Intrusion Detection System web site
    • Sourcefire: Snort Network Intrusion Detection System web site (1999) URL http://www.snort.org.
    • (1999)
  • 6
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous Payload-Based Network Intrusion Detection
    • In Jonsson, E., Valdes, A., Almgren, M., eds., LNCS., Springer-Verlag
    • Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In Jonsson, E., Valdes, A., Almgren, M., eds.: RAID '04: Proc. 7th Symposium on Recent Advances in Intrusion Detection. Volume 3224 of LNCS., Springer-Verlag (2004) 203-222
    • (2004) RAID '04: Proc. 7th Symposium On Recent Advances In Intrusion Detection , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 13
    • 84882765690 scopus 로고    scopus 로고
    • Self-Organizing Maps. Volume 30 of Springer Series in Information Sciences
    • Kohonen, T.: Self-Organizing Maps. Volume 30 of Springer Series in Information Sciences. Springer (1995) (Second Extended Edition 1997).
    • (1997) Springer (1995) (Second Extended Edition
    • Kohonen, T.1
  • 15
    • 84885774862 scopus 로고    scopus 로고
    • A Framework for Constructing Features andModels for Intrusion Detection Systems
    • Lee, W., Stolfo, S.J.: A Framework for Constructing Features andModels for Intrusion Detection Systems. ACM Transactions on Information and System Security 3(4) (2000) 227-261
    • (2000) ACM Transactions On Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 16
    • 0036038437 scopus 로고    scopus 로고
    • Service specific anomaly detection for network intrusion detection
    • ACM Press
    • Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: SAC '02: Proc. 2002 ACM Symposium on Applied Computing, ACM Press (2002) 201-208
    • (2002) SAC '02 , pp. 201-208
    • Kruegel, C.1    Toth, T.2    Kirda, E.3
  • 17
    • 0011192575 scopus 로고    scopus 로고
    • CERT, Technical report, CERT Coordination Center
    • CERT: Ip Denial of Service Attacks. Technical report, CERT Coordination Center (1997) http://www.cert.org/advisories/CA-1997-28.html.
    • (1997) Ip Denial of Service Attacks
  • 18
    • 84882780127 scopus 로고    scopus 로고
    • Web Application Security Consortium: Web Security Threat Classification, URL
    • Web Application Security Consortium: Web Security Threat Classification (2005) URL http://www.webappsec.org/projects/threat/.
    • (2005)
  • 21
    • 84882769028 scopus 로고    scopus 로고
    • PostNuke, PostNuke Content Managament System, URL
    • PostNuke: PostNuke Content Managament System (2006) URL http://www.postnuke.com/.
    • (2006)
  • 28
    • 0028911698 scopus 로고
    • Gauging similarity with n-grams: Language-independent categorization of text
    • Damashek, M.: Gauging similarity with n-grams: Language-independent categorization of text. Science 267(5199) (1995) 843-848
    • (1995) Science , vol.267 , Issue.5199 , pp. 843-848
    • Damashek, M.1
  • 29
    • 35248857893 scopus 로고    scopus 로고
    • An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
    • In Vigna, G., Kruegel, C., Jonsson, E., eds., Volume 2820 of LNCS., Springer-Verlag
    • Mahoney, M.V., Chan, P.K.: An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In Vigna, G., Kruegel, C., Jonsson, E., eds.: RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection. Volume 2820 of LNCS., Springer-Verlag (2003) 220-237
    • (2003) RAID '03: Proc. 6th Symposium On Recent Advances In Intrusion Detection , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.