메뉴 건너뛰기




Volumn 7449 LNCS, Issue , 2012, Pages 105-117

Advances and challenges in standalone host-based intrusion detection systems

Author keywords

HIDS; host based IDS; intrusion detection; survey

Indexed keywords

COLLABORATIVE INTRUSION DETECTION SYSTEM; HIDS; HOST-BASED; HOST-BASED INTRUSION DETECTION SYSTEM; INTEGRITY CHECKING; NETWORK TRAFFIC ANALYSIS; NETWORK-BASED; PROCESS BEHAVIOR; RESEARCH EFFORTS; RESEARCH TRENDS; UNTRUSTED NETWORK;

EID: 84866010567     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32287-7_9     Document Type: Conference Paper
Times cited : (11)

References (28)
  • 1
    • 55649089217 scopus 로고    scopus 로고
    • Automated containment of rootkits attacks
    • Baliga, A., Iftode, L., Chen, X.: Automated containment of rootkits attacks. Computers & Security 27(7-8), 323-334 (2008)
    • (2008) Computers & Security , vol.27 , Issue.7-8 , pp. 323-334
    • Baliga, A.1    Iftode, L.2    Chen, X.3
  • 4
    • 84866013498 scopus 로고    scopus 로고
    • Host-Based Anomaly Intrusion Detection
    • Springer, Heidelberg
    • Hu, J.: Host-Based Anomaly Intrusion Detection. In: Handbook of Information and Communication Security, pp. 235-255. Springer, Heidelberg (2010)
    • (2010) Handbook of Information and Communication Security , pp. 235-255
    • Hu, J.1
  • 5
    • 77955711605 scopus 로고    scopus 로고
    • A guest-transparent file integrity monitoring method in virtualization environment
    • Jin, H., Xiang, G., Zou, D., Zhao, F., Li, M., Yu, C.: A guest-transparent file integrity monitoring method in virtualization environment. Computers & Mathematics with Applications 60(2), 256-266 (2010)
    • (2010) Computers & Mathematics with Applications , vol.60 , Issue.2 , pp. 256-266
    • Jin, H.1    Xiang, G.2    Zou, D.3    Zhao, F.4    Li, M.5    Yu, C.6
  • 9
    • 79956297873 scopus 로고    scopus 로고
    • Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host
    • Bao, F., Weng, J. (eds.) ISPEC 2011. Springer, Heidelberg
    • Kwon, J., Lee, J., Lee, H.: Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 343-361. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6672 , pp. 343-361
    • Kwon, J.1    Lee, J.2    Lee, H.3
  • 10
    • 41549111606 scopus 로고    scopus 로고
    • PROBE: A Process Behavior-Based Host Intrusion Prevention System
    • Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. Springer, Heidelberg
    • Kwon, M., Jeong, K., Lee, H.: PROBE: A Process Behavior-Based Host Intrusion Prevention System. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 203-217. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4991 , pp. 203-217
    • Kwon, M.1    Jeong, K.2    Lee, H.3
  • 23
    • 56549109177 scopus 로고    scopus 로고
    • Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Srivastava, A., Giffin, J.: Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 39-58. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 39-58
    • Srivastava, A.1    Giffin, J.2
  • 26
    • 67249152348 scopus 로고    scopus 로고
    • Detection of Bot Infected PCs Using Destination-based IP and Domain Whitelists during a Non-operating Term
    • IEEE Computer Society, Washington, DC
    • Takemori, K., Nishigaki, M., Tomohiro, T., Yutaka, M.: Detection of Bot Infected PCs Using Destination-based IP and Domain Whitelists during a Non-operating Term. In: GLOBECOM 2008 Proceedings of the Global Communications Conference, pp. 2072-2077. IEEE Computer Society, Washington, DC (2008)
    • (2008) GLOBECOM 2008 Proceedings of the Global Communications Conference , pp. 2072-2077
    • Takemori, K.1    Nishigaki, M.2    Tomohiro, T.3    Yutaka, M.4
  • 27
    • 76549113940 scopus 로고    scopus 로고
    • User-Assisted Host-Based Detection of Outbound Malware Traffic
    • Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. Springer, Heidelberg
    • Xiong, H., Malhotra, P., Stefan, D., Wu, C., Yao, D.: User-Assisted Host-Based Detection of Outbound Malware Traffic. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 293-307. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5927 , pp. 293-307
    • Xiong, H.1    Malhotra, P.2    Stefan, D.3    Wu, C.4    Yao, D.5
  • 28
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers & Security 29(1), 124-140 (2010)
    • (2010) Computers & Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.