메뉴 건너뛰기




Volumn , Issue , 2002, Pages 5-10

A structural framework for modeling multi-stage network attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; FORESTRY; INTRUSION DETECTION; TREES (MATHEMATICS);

EID: 84860434875     PISSN: 15302016     EISSN: None     Source Type: Journal    
DOI: 10.1109/ICPPW.2002.1039705     Document Type: Article
Times cited : (40)

References (16)
  • 3
    • 0003531721 scopus 로고    scopus 로고
    • PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania
    • J. Howard. An Analysis of Security Incidents on the Internet, 1989-1995. PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania, 1997.
    • (1997) An Analysis of Security Incidents on the Internet, 1989-1995
    • Howard, J.1
  • 4
    • 84958754467 scopus 로고    scopus 로고
    • A brief introduction to coloured petri nets
    • Enschede, The Netherlands
    • K. Jensen. A brief introduction to coloured petri nets. In Proceeding of the TACAS'97 Workshop, pages 203-208, Enschede, The Netherlands, 1997.
    • (1997) Proceeding of the TACAS'97 Workshop , pp. 203-208
    • Jensen, K.1
  • 5
    • 0003518833 scopus 로고
    • PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana
    • S. Kumar. Classification and Detection of Computer Intrusions. PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana, 1995.
    • (1995) Classification and Detection of Computer Intrusions
    • Kumar, S.1
  • 7
    • 28444482594 scopus 로고
    • Penetration of computer systems: An overview
    • R. Lackey. Penetration of computer systems: An overview. Honeywell Computing Journal, 8(2):81-85, 1974.
    • (1974) Honeywell Computing Journal , vol.8 , Issue.2 , pp. 81-85
    • Lackey, R.1
  • 8
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws
    • C. Landwehr. A taxonomy of computer program security flaws. ACM Computing Surveys, 26(3):211-254, 1994.
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.1
  • 10
    • 84954536489 scopus 로고    scopus 로고
    • Attack modeling for information security and survivability
    • A. Moore et al. Attack modeling for information security and survivability. Survivability Systems Unlimited, 2001.
    • (2001) Survivability Systems Unlimited
    • Moore, A.1
  • 11
    • 84954551439 scopus 로고    scopus 로고
    • Scottsdale, Arizona
    • Motorola Intrusion Vision, MIV. Scottsdale, Arizona, 2001. http://www.generaldynamic.com.
    • (2001) Motorola Intrusion Vision, MIV
  • 13
  • 16
    • 84954565769 scopus 로고    scopus 로고
    • A large-scale distributed intrusion detection framework based on attack strategy analysis
    • The Boeing Company, Seattle, WA U.S.A
    • T. Wicks and M. Haung. A large-scale distributed intrusion detection framework based on attack strategy analysis. In Applied Research and Technology, The Boeing Company, Seattle, WA U.S.A, 1998.
    • (1998) Applied Research and Technology
    • Wicks, T.1    Haung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.