메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 188-201

"Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector

Author keywords

Chromium; Detectors; Privacy; Security

Indexed keywords

CHROMIUM; DATA PRIVACY; DETECTORS; MERCURY (METAL); SECURITY OF DATA; SIGNAL DETECTION;

EID: 84880858814     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2002.1004371     Document Type: Conference Paper
Times cited : (40)

References (12)
  • 1
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis and implications
    • 6-8 May 1996, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
    • P. D'haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: algorithms, analysis and implications. In IEEE Symposium on Security and Privacy, 6-8 May 1996, Oakland, California, pages 110-119, IEEE Computer Society Press, Los Alamitos, California. 1996.
    • (1996) IEEE Symposium on Security and Privacy , pp. 110-119
    • D'haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 2
    • 0029716418 scopus 로고    scopus 로고
    • A sense of self for unix processes
    • 6-8 May 1996, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
    • S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In IEEE Symposium on Security and Privacy, 6-8 May 1996, Oakland, California, pages 120-128,IEEE Computer Society Press, Los Alamitos, California. 1996.
    • (1996) IEEE Symposium on Security and Privacy , pp. 120-128
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3    Longstaff, T.A.4
  • 3
    • 0027961889 scopus 로고
    • Self-nonself discrimination in a computer
    • 16-18 May 1994, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
    • S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In IEEE Symposium on Security and Privacy, 16-18 May 1994, Oakland, California, pages 202-212,IEEE Computer Society Press, Los Alamitos, California, 1994.
    • (1994) IEEE Symposium on Security and Privacy , pp. 202-212
    • Forrest, S.1    Perelson, A.S.2    Allen, L.3    Cherukuri, R.4
  • 5
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • 14-16 May 2001, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
    • W. Lee and D. Xiang. Information-theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, 14-16 May 2001, Oakland, California, pages 130-143, IEEE Computer Society Press, Los Alamitos, California, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 6
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behavior of a program using multiple-length n-grams
    • 18-22 September, Ballycotton, County Cork, Ireland, ACM Press, New York, NY
    • C. Marceau. Characterizing the behavior of a program using multiple-length n-grams. In New Security Paradigms Workshop, 18-22 September 2000, Ballycotton, County Cork, Ireland, pages 101-110, ACM Press, New York, NY, 2001.
    • (2000) New Security Paradigms Workshop , pp. 101-110
    • Marceau, C.1
  • 7
    • 0034590432 scopus 로고    scopus 로고
    • Benchmarking anomaly-based detection systems
    • 25-28 June 2000, New York, New York, IEEE Computer Society Press, Los Alamitos, California
    • R. A. Maxion and K. M. C. Tan. Benchmarking anomaly-based detection systems. In International Conference on Dependable Systems and Networks, 25-28 June 2000, New York, New York, pages 623-630, IEEE Computer Society Press, Los Alamitos, California, 2000.
    • (2000) International Conference on Dependable Systems and Networks , pp. 623-630
    • Maxion, R.A.1    Tan, K.M.C.2
  • 9
  • 12
    • 84880174811 scopus 로고    scopus 로고
    • Detecting intrusions using system calls:Alternative data models
    • 9-12 May 1999, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
    • C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls:Alternative data models. In IEEE Symposium on Security and Privacy, 9-12 May 1999, Oakland, California, pages 133-145, IEEE Computer Society Press, Los Alamitos, California, 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.