메뉴 건너뛰기




Volumn 15, Issue 2, 2013, Pages 97-105

Signature-based multi-layer distributed intrusion detection system using mobile agents

Author keywords

Anomaly based IDS; Intrusion detection systems; Mobile agent; Signature based IDS; Snort

Indexed keywords

ANOMALY-BASED IDS; DISTRIBUTED INTRUSION DETECTION SYSTEMS; INTRUSION DETECTION SYSTEMS; MALICIOUS ACTIVITIES; NETWORK INTRUSION DETECTION; SIGNATURE DATABASE; SIGNATURE-BASED IDS; SNORT;

EID: 84875356217     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (42)

References (32)
  • 1
    • 33644921425 scopus 로고    scopus 로고
    • Configurable string matching hardware for speeding up intrusion detection
    • M. Aldwairi, T. Conte, and P. Franzon, "Configurable string matching hardware for speeding up intrusion detection," ACM SIGARCH Computer Architecture News, vol. 33, no. 1, pp. 99-107, 2005.
    • (2005) ACM SIGARCH Computer Architecture News , vol.33 , Issue.1 , pp. 99-107
    • Aldwairi, M.1    Conte, T.2    Franzon, P.3
  • 2
    • 33645589730 scopus 로고    scopus 로고
    • An Introduction to Intrusion Detection & Assessment
    • ICSA
    • R. Bace, An Introduction to Intrusion Detection & Assessment, Technical White Paper, ICSA, 1999.
    • (1999) Technical White Paper
    • Bace, R.1
  • 5
    • 84875326922 scopus 로고    scopus 로고
    • D. Bailey, Sneeze. (http://archives.neohapsis.com/archives/snort/2001-08/0180.html)
    • Sneeze
    • Bailey, D.1
  • 6
    • 27544471466 scopus 로고    scopus 로고
    • Snort 2.1 Intrusion Detection: Syngress Media Inc
    • J. Beale, A. R. Baker, B. Caswell, and M. Poor, Snort 2.1 Intrusion Detection: Syngress Media Inc, 2004.
    • (2004)
    • Beale, J.1    Baker, A.R.2    Caswell, B.3    Poor, M.4
  • 7
    • 84856748550 scopus 로고    scopus 로고
    • A hybrid model for network security systems: Integrating intrusion detection system with survivability
    • T. Bhaskar, B. Narasimha Kamath, and S.D. Moitra, "A hybrid model for network security systems: Integrating intrusion detection system with survivability," International Journal of Network Security, vol. 7, no. 2, pp. 249-260, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 249-260
    • Bhaskar, T.1    Narasimha Kamath, B.2    Moitra, S.D.3
  • 9
    • 84875359389 scopus 로고    scopus 로고
    • Fun with Packets: Designing a Stick
    • Inc
    • G. Coretez, Fun with Packets: Designing a Stick, Endeavor Systems, Inc, 2002.
    • (2002) Endeavor Systems
    • Coretez, G.1
  • 12
    • 84875303745 scopus 로고    scopus 로고
    • IDSwakeup. (http://www.hsc.fr/ressources/outils/idswakeup/index.html.en)
    • IDSwakeup
  • 13
  • 14
    • 77956388396 scopus 로고    scopus 로고
    • Deciphering Detection Techniques: Part II Anomaly-based Intrusion Detection
    • F. Gong, Deciphering Detection Techniques: Part II Anomaly-based Intrusion Detection, White Paper, McAfee Security, 2003.
    • (2003) White Paper, McAfee Security
    • Gong, F.1
  • 15
    • 34249865012 scopus 로고    scopus 로고
    • Research on intrusion detection and response: A survey
    • P. Kabiri and A. A. Ghorbani, "Research on intrusion detection and response: A survey," International Journal of Network Security, vol. 1, no. 2, pp. 84-102, 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 84-102
    • Kabiri, P.1    Ghorbani, A.A.2
  • 16
    • 0004204715 scopus 로고    scopus 로고
    • A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems
    • S. M. Thesis
    • K. Kendall, A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, S. M. Thesis, Massachusetts Institute of Technology, 1999.
    • (1999) Massachusetts Institute of Technology
    • Kendall, K.1
  • 19
    • 38149079834 scopus 로고    scopus 로고
    • A feature classi-fication scheme for network intrusion detection
    • I. V. Onut and A. A. Ghorbani, "A feature classi-fication scheme for network intrusion detection," International Journal of Network Security, vol. 5, no 1, pp. 1-15, 2007.
    • International Journal of Network Security , vol.5 , Issue.1 , pp. 1-15
    • Onut, I.V.1    Ghorbani, A.A.2
  • 22
    • 84875318097 scopus 로고    scopus 로고
    • Snort Intrusion Detection 2.0
    • R. Russell, Snort Intrusion Detection 2.0, Syngress Pub., 2003.
    • (2003) Syngress Pub
    • Russell, R.1
  • 25
    • 58149104386 scopus 로고    scopus 로고
    • Guide to Intrusion Detection and Prevention Systems (Idps)
    • K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (Idps), NIST Special Publication, vol. 8, pp. 800-894, 2007.
    • (2007) NIST Special Publication , vol.8 , pp. 800-894
    • Scarfone, K.1    Mell, P.2
  • 30
    • 80053156764 scopus 로고    scopus 로고
    • Techniques for Improving the Per-formance of Signature-based Network Intrusion Detection Systems
    • University of California
    • P. S. Wheeler, Techniques for Improving the Per-formance of Signature-based Network Intrusion Detection Systems, University of California, 2006.
    • (2006)
    • Wheeler, P.S.1
  • 31
    • 42549142161 scopus 로고    scopus 로고
    • Anomaly based network intrusion detection with unsupervised outlier detection
    • J. Zhang and M. Zulkernine, "Anomaly based network intrusion detection with unsupervised outlier detection," in IEEE International Conference on Communications, pp. 2388-2393, 2006.
    • (2006) IEEE International Conference on Communications , pp. 2388-2393
    • Zhang, J.1    Zulkernine, M.2
  • 32
    • 78049530653 scopus 로고    scopus 로고
    • An observation-centric analysis on the modeling of anomaly-based intrusion detection
    • Z. Zhang, H. Shen, and Y. Sang, "An observation-centric analysis on the modeling of anomaly-based intrusion detection," International Journal of Network Security, vol. 4, no. 3, pp. 292-305, 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.3 , pp. 292-305
    • Zhang, Z.1    Shen, H.2    Sang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.