메뉴 건너뛰기




Volumn 39, Issue , 2008, Pages 69-70

A Survey of Insider Attack Detection Research

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84882794354     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-77322-3_5     Document Type: Article
Times cited : (249)

References (43)
  • 1
    • 12344282545 scopus 로고
    • Secure Computer Systems: Mathematical Foundations
    • Bell D E, LaPadula L J, Secure Computer Systems: Mathematical Foundations. MITRE Corporation, 1973.
    • (1973) MITRE Corporation
    • Bell, D.E.1    Lapadula, L.J.2
  • 2
  • 11
    • 84882760278 scopus 로고    scopus 로고
    • User Profiling for Intrusion Detection in Windows NT
    • Goldring T, User Profiling for Intrusion Detection in Windows NT. 35th Symposium on the Interface, 2003.
    • (2003) 35th Symposium On the Interface
    • Goldring, T.1
  • 13
    • 84882778490 scopus 로고    scopus 로고
    • A Filtering Approach To Anomaly and Masquerade Detection
    • Jha S, Kruger L, Kurtz T, Lee Y, Smith A, A Filtering Approach To Anomaly and Masquerade Detection, 2004. http://www.people.fas.harvard.edu/~lee48/research/IDS.pdf
    • (2004)
    • Jha, S.1    Kruger, L.2    Kurtz, T.3    Lee, Y.4    Smith, A.5
  • 15
    • 0012291134 scopus 로고    scopus 로고
    • A Hybrid High-Order Markov Chain Model For Computer Intrusion Detection, Technical Report Number 92
    • Ju W-H, Vardi Y, A Hybrid High-Order Markov Chain Model For Computer Intrusion Detection, Technical Report Number 92, National Institute of Statistical Sciences, 1999.
    • (1999) National Institute of Statistical Sciences
    • Ju, W.-H.1    Vardi, Y.2
  • 27
    • 84882767622 scopus 로고    scopus 로고
    • Eigen Co-occurrence Matrix Method for Masquerade Detection
    • Oka M, Oyama Y, Kato K, Eigen Co-occurrence Matrix Method for Masquerade Detection, 2004 http://spa.jssst.or.jp/2004/pub/papers/04016.pdf.
    • (2004)
    • Oka, M.1    Oyama, Y.2    Kato, K.3
  • 28
    • 35048851006 scopus 로고    scopus 로고
    • Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix, RAID
    • Oka M, Oyama Y, Abe H, Kato K, Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix, RAID 2004, 223-237.
    • (2004) , pp. 223-237
    • Oka, M.1    Oyama, Y.2    Abe, H.3    Kato, K.4
  • 31
    • 84882786102 scopus 로고    scopus 로고
    • Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
    • Randazzo M R, Keeney M, Kowalski E, Cappelli D, Moore A, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, 2004.
    • (2004)
    • Randazzo, M.R.1    Keeney, M.2    Kowalski, E.3    Cappelli, D.4    Moore, A.5
  • 34
    • 84882775488 scopus 로고    scopus 로고
    • Selection, Combination, and Evaluation of Effective Software Sensors for Detecting Abnormal Computer Usage
    • Shavlik J, Shavlik M, Selection, Combination, and Evaluation of Effective Software Sensors for Detecting Abnormal Computer Usage, Pentagon Reports, 2004.
    • (2004) Pentagon Reports
    • Shavlik, J.1    Shavlik, M.2
  • 35
    • 0036395373 scopus 로고    scopus 로고
    • A Framework For Understanding And Predicting Insider Attacks
    • Schultz E E, A Framework For Understanding And Predicting Insider Attacks. Journal of Computers and Security 21:526-531, 2002.
    • (2002) Journal of Computers and Security , vol.21 , pp. 526-531
    • Schultz, E.E.1
  • 38
    • 15944400613 scopus 로고    scopus 로고
    • Recursive Data Mining for Masquerade Detection and Author Identification
    • Szymanski B K, Zhang Y, Recursive Data Mining for Masquerade Detection and Author Identification. Information Assurance Workshop:424-431,2004.
    • (2004) Information Assurance Workshop , pp. 424-431
    • Szymanski, B.K.1    Zhang, Y.2
  • 39
    • 84880858814 scopus 로고    scopus 로고
    • Why 6 Defining the Operational Limits of stide, and Anomaly-Based Intrusion Detector
    • Tan K, Maxion R A, "Why 6" Defining the Operational Limits of stide, and Anomaly-Based Intrusion Detector. IEEE Symposium on Security and Privacy, 2002.
    • (2002) IEEE Symposium On Security and Privacy
    • Tan, K.1    Maxion, R.A.2
  • 42
    • 0035402112 scopus 로고    scopus 로고
    • Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. Systems, Man and Cybernetics
    • Ye N, Li X, Chen Q, Emran S M, Xu M, Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. Systems, Man and Cybernetics, Part A 31:4:266-274, 2001.
    • (2001) Part a 31:4 , pp. 266-274
    • Ye, N.1    Li, X.2    Chen, Q.3    Emran, S.M.4    Xu, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.