메뉴 건너뛰기




Volumn 2535, Issue , 2002, Pages 64-77

An intrusion detection system for aglets

Author keywords

Auditing; Intrusion detection; Mobile agents; Security

Indexed keywords

ACCESS CONTROL; COMPUTER CRIME; INTRUSION DETECTION; PETROLEUM RESERVOIR EVALUATION;

EID: 84861266125     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36112-x_5     Document Type: Conference Paper
Times cited : (4)

References (35)
  • 1
    • 84944115205 scopus 로고    scopus 로고
    • June
    • The Aglets Software Development Kit (ASDK). http://sourceforge.net/projects/aglets/, June 2002.
    • (2002)
  • 4
    • 84944043420 scopus 로고    scopus 로고
    • In IIS Indexing Service DLL.Advisory CA-2001-19, July
    • CER T/CC. “Code Red Worm” Exploiting Buffer Overflow In IIS Indexing Service DLL.Advisory CA-2001-19, July 2001.
    • (2001) Code Red Worm” Exploiting Buffer Overflow
  • 5
    • 0002380598 scopus 로고    scopus 로고
    • Securit y Issues in Mobile Code Systems
    • In G. Vigna, editor, Springer-V erlag, June
    • D.M. Chess.Securit y Issues in Mobile Code Systems. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS, pages 1–14.Springer-V erlag, June 1998.
    • (1998) Mobile Agents and Security, Volume 1419 of LNCS , pp. 1-14
    • Chess, D.M.1
  • 7
    • 15044348810 scopus 로고    scopus 로고
    • PhD thesis, Department of Computer Science, UCSB, Santa Barbara, CA, June
    • S. T. Eckmann. The STATL Attack Detection Language. PhD thesis, Department of Computer Science, UCSB, Santa Barbara, CA, June 2002.
    • (2002) The STATL Attack Detection Language
    • Eckmann, S.T.1
  • 11
    • 0033689082 scopus 로고    scopus 로고
    • Supporting reconfigurable security policies for mobile programs
    • June
    • B. Hashii, S. Malabarba, R. Pandey, and M. Bishop. Supporting reconfigurable security policies for mobile programs. Computer Networks, 33(1-6):77–93, June 2000.
    • (2000) Computer Networks , vol.33 , Issue.1-6 , pp. 77-93
    • Hashii, B.1    Malabarba, S.2    Pandey, R.3    Bishop, M.4
  • 12
    • 0027668428 scopus 로고
    • Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
    • P aul Helman and Gunar Liepins. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. In IEEE Transactions on Software Engineering, volume Vol 19, No.9, pages 886–901, 1993.
    • (1993) In IEEE Transactions on Software Engineering, Volume , vol.19 , Issue.9 , pp. 886-901
    • Aul Helman, P.1    Liepins, G.2
  • 14
    • 0029267472 scopus 로고
    • State Transition Analysis: A Rule- Based Intrusion Detection System
    • March
    • K. Ilgun, R.A. Kemmerer, and P.A. Porras. State Transition Analysis: A Rule- Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181–199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 17
    • 0004118981 scopus 로고
    • The NIDES Statistical Component Description and Justification
    • Menlo Park, CA, March
    • H.S. Javitz and A. Valdes. The NIDES Statistical Component Description and Justification. Technical report, SRI International, Menlo Park, CA, March 1994.
    • (1994) Technical Report, SRI International
    • Javitz, H.S.1    Valdes, A.2
  • 19
  • 21
    • 84940110274 scopus 로고    scopus 로고
    • Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST)
    • Oakland, California, May
    • U. Lindqvist and P.A. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146–161, Oakland, California, May 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 25
    • 84986199479 scopus 로고    scopus 로고
    • Software Engineering for Mobility: A Roadmap
    • In A. Finkelstein, editor, A CM Press
    • Gruia-Catalin Roman, Gian Pietro Picco, and Amy L. Murphy. Software Engineering for Mobility: A Roadmap.In A. Finkelstein, editor, The Future of Software Engineering, pages 241–258.A CM Press, 2000.
    • (2000) The Future of Software Engineering , pp. 241-258
    • Roman, G.-C.1    Picco, G.P.2    Murphy, A.L.3
  • 28
    • 84944115211 scopus 로고    scopus 로고
    • June
    • Tcp dump and Libpcap Documentation. http://www.tcpdump.org/, June 2002.
    • (2002)
  • 30
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic Traces for Mobile Agents
    • In G. Vigna, editor, Springer-Verlag, June
    • G. Vigna.Cryptographic Traces for Mobile Agents.In G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, June 1998.
    • (1998) Mobile Agents and Security, Volume 1419 of LNCS
    • Vigna, G.1
  • 31
    • 84860434876 scopus 로고    scopus 로고
    • The STAT Tool Suite
    • Hilton Head, South Carolina, January 2000.IEEE Computer Society Press
    • G. Vigna, S. Eckmann, and R. Kemmerer. The STAT Tool Suite. In Proceedings of DISCEX 2000, Hilton Head, South Carolina, January 2000.IEEE Computer Society Press.
    • Proceedings of DISCEX 2000
    • Vigna, G.1    Eckmann, S.2    Kemmerer, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.