메뉴 건너뛰기




Volumn 6, Issue , 2002, Pages 2671-2682

LARIAT: Lincoln adaptable real-time information assurance testbed

Author keywords

automated; evaluations; intrusion detection; Keal time; quanlitative; realistic; repeatable; testbed

Indexed keywords

AUTOMATED; EVALUATIONS; KEAL-TIME; QUANLITATIVE; REALISTIC; REPEATABLE;

EID: 84879333627     PISSN: 1095323X     EISSN: None     Source Type: Journal    
DOI: 10.1109/AERO.2002.1036158     Document Type: Article
Times cited : (74)

References (19)
  • 1
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • R. Lippmann, J. Haines, D. Fried, J. Korba, and K, Das, The 1999 DARPA off-line intrusion detection evaluation, Networks, 34, pp, 579-595, 2000
    • (2000) Networks , vol.34 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3    Korba, J.4    Das, K.5
  • 2
    • 3543130426 scopus 로고    scopus 로고
    • Dragon claws its way to the top
    • August 20
    • Greg Shipley and Patrick Mueller, Dragon Claws its Way to the Top, Network Computing, August 20, 2001
    • (2001) Network Computing
    • Shipley, G.1    Mueller, P.2
  • 5
    • 85013582683 scopus 로고    scopus 로고
    • A public web site at httn: 7www.ll.mii.edu/IST/ideval/index.html contains information on the 1998 and 1999 evaluations and the DDOS datasets. Follow instructions on this web site or send email to the authors (rpi orjhaines@sst.ll.mit.edu) to obtain access to a password-protected site with complete up-to-date information on these evaluations and results
    • A public web site at httn: 7www.ll.mii.edu/IST/ideval/index.html contains information on the 1998 and 1999 evaluations and the DDOS datasets. Follow instructions on this web site or send email to the authors (rpi orjhaines@sst.ll.mit.edu) to obtain access to a password-protected site with complete up-to-date information on these evaluations and results
  • 10
    • 85013621850 scopus 로고    scopus 로고
    • Skaion Corporation, 2001
    • Skaion Corporation, www.skaion.com 2001
  • 13
    • 84879334528 scopus 로고    scopus 로고
    • Host-based bottleneck verification efficiently detects novel computer attacks
    • Atlantic City, NJ, USA
    • R. Cunningham, R. Lippmann, et al. Host-based Bottleneck Verification efficiently detects novel computer attacks, IEEE Military Communications Conference Proceedings, Atlantic City, NJ, USA, 1999
    • (1999) IEEE Military Communications Conference Proceedings
    • Cunningham, R.1    Lippmann, R.2
  • 15
    • 85013621313 scopus 로고    scopus 로고
    • Internet Engineering Task Force. Intrusion Detection Message Exchange Format (1DMEF). charters/idwg-charter.html. 2001
    • Internet Engineering Task Force. Intrusion Detection Message Exchange Format (1DMEF). www.ietf.org/1itml. charters/idwg-charter.html. 2001
  • 16
    • 85013568797 scopus 로고    scopus 로고
    • MITRE Common Vulnerabilities and Exposures (CVE). 2001
    • MITRE Common Vulnerabilities and Exposures (CVE). http://w\v\v.cve.mitre. org/. 2001
  • 17
    • 85013593052 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) ICAT metadatabase, 2001
    • National Institute of Standards and Technology (NIST) ICAT metadatabase, http://icat.nist.gov/. 2001
  • 19
    • 85013599333 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) Expect. 2001
    • National Institute of Standards and Technology (NIST) Expect. hUp://expect.nist.aov. 2001


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.