메뉴 건너뛰기




Volumn 469, Issue , 2009, Pages 34-50

Accumulating evidence of insider attacks

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN STATISTICS; INSIDER ATTACK; LARGE VOLUMES; MULTIPLE SOURCE; SCALABLE SOLUTION; WORKED EXAMPLES;

EID: 84883337388     PISSN: 16130073     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (14)
  • 2
    • 0038223829 scopus 로고    scopus 로고
    • Intrusion detection systems (IDS)
    • National Institute of Standards and Technology (NIST), 2001
    • Rebecca Bace and Peter Mell. Intrusion detection systems (IDS). Technical Report SP 800-31, National Institute of Standards and Technology (NIST), 2001 2001.
    • (2001) Technical Report SP 800-31
    • Bace, R.1    Mell, P.2
  • 6
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • Srilatha Chebrolua, Ajith Abrahama, and Johnson P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers and Security, 24(4):295-307, 2004.
    • (2004) Computers and Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolua, S.1    Abrahama, A.2    Thomas, J.P.3
  • 7
  • 9
    • 77949545382 scopus 로고    scopus 로고
    • TJX breach was twice as big as admitted, banks say
    • 24 October
    • Dan Goodin. TJX breach was twice as big as admitted, banks say. The Register, 24 October 2007.
    • (2007) The Register
    • Goodin, D.1
  • 10
    • 84866633841 scopus 로고    scopus 로고
    • Tactical operations and strategic intelligence: Sensor purpose and placement
    • 9 September 2002
    • Todd Heberlein. Tactical operations and strategic intelligence: Sensor purpose and placement. Technical Report TR-2002-04.02, Net Squared, Inc., 9 September 2002 2002.
    • (2002) Technical Report TR-2002-04.02, Net Squared, Inc
    • Heberlein, T.1
  • 11
    • 33745444138 scopus 로고    scopus 로고
    • Detecting insider threats by monitoring system call activity
    • United States Military Academy, West Point, IEEE Computer Society
    • Nam Nguyen, Peter Reiher, and Geoffrey H. Kuenning. Detecting insider threats by monitoring system call activity. In 2003 IEEE Workshop on Information Assurance, pages 18-20, United States Military Academy, West Point, 2003. IEEE Computer Society.
    • (2003) 2003 IEEE Workshop on Information Assurance , pp. 18-20
    • Nguyen, N.1    Reiher, P.2    Kuenning, G.H.3
  • 12
    • 84874839574 scopus 로고    scopus 로고
    • U.S. Secret service and cert coordination center/sei insider threat study: Illicit cyber activity in the banking and finance sector
    • Carnegie Mellon University, August
    • Marisa Reddy Randazzo, Dawn Cappelli, Michelle Keeney, Andrew Moore, and Eileen Kowalski. U.S. secret service and CERT coordination center/SEI insider threat study: Illicit cyber activity in the banking and finance sector. Technical report, Software Engineering Institute, Carnegie Mellon University, August 2004.
    • (2004) Technical Report, Software Engineering Institute
    • Randazzo, M.R.1    Cappelli, D.2    Keeney, M.3    Moore, A.4    Kowalski, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.