메뉴 건너뛰기




Volumn 6, Issue 1 SUPPL., 2012, Pages

Decision support system for zero-day attack response

Author keywords

Attack similarity; Case based reasoning; Decision support system; Zero day attack

Indexed keywords


EID: 84896839926     PISSN: 19350090     EISSN: 23250399     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (29)
  • 4
    • 84896874024 scopus 로고    scopus 로고
    • Applications of Data Mining in Computer Security
    • Barbara, D., and Jajodia, S., Applications of Data Mining in Computer Security, Kluwer Academic Publishers. 2002 6-7.
    • (2002) Kluwer Academic Publishers , pp. 6-7
    • Barbara, D.1    Jajodia, S.2
  • 10
    • 84896842617 scopus 로고    scopus 로고
    • r0ut3r, GoodTech SSH Server SFTP Multiple Command, Handling Overflow
    • r0ut3r, GoodTech SSH Server SFTP Multiple Command, Handling Overflow, http://www.milw0rm.com/exploits/6804, 2008.
    • (2008)
  • 11
    • 84896869677 scopus 로고    scopus 로고
    • 50 ways to defeat your intrusion detection system
    • Cohen, F., 50 ways to defeat your intrusion detection system. 1997. http://all.net/journal/netsec/1997-12.html.
    • (1997)
    • Cohen, F.1
  • 12
    • 84896852444 scopus 로고    scopus 로고
    • CAPEC(Common Attack Pattern Enumeration and Classification). MITRE cooperation
    • CAPEC(Common Attack Pattern Enumeration and Classification). MITRE cooperation. http://capec.mitre.org.
  • 13
    • 84896850183 scopus 로고    scopus 로고
    • CWE (Common Weakness Enumeration) MITRE cooperation
    • CWE (Common Weakness Enumeration). http://cwe.mitre.org. MITRE cooperation.
  • 14
    • 84896818265 scopus 로고    scopus 로고
    • CVE (Common Vulnerability Exposure) MITRE cooperation
    • CVE (Common Vulnerability Exposure). http://cve.mitre.org. MITRE cooperation.
  • 15
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • Wang, L., Noel, S. and Jajodia, S., Minimum-cost network hardening using attack graphs, Computer Communications. 29 (2006) 3812-3824.
    • (2006) Computer Communications , vol.29 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3
  • 16
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • Jajodia, S., Noel, S. and O'Berry, B., Topological analysis of network attack vulnerability, Massive Computing. 5 (2005) 247-266.
    • (2005) Massive Computing , vol.5 , pp. 247-266
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 18
    • 84896859825 scopus 로고    scopus 로고
    • Tool based formal Modeling, Analysis and Visualization of Enterprise Network Vulnerabilities utilising Attack Graph Exploration
    • Rieke, R., Tool based formal Modeling, Analysis and Visualization of Enterprise Network Vulnerabilities utilising Attack Graph Exploration, European Institute for Computer Antivirus Research (EICAR). 2004.
    • (2004) European Institute for Computer Antivirus Research (EICAR)
    • Rieke, R.1
  • 20
    • 84896896004 scopus 로고    scopus 로고
    • A comparison of Case-based Reasoning and Neural Network Model for Intrusion Detection
    • Joo, D., Hong, T., Lee, S. and Han, I., A comparison of Case-based Reasoning and Neural Network Model for Intrusion Detection, Computer and Security. (2003).
    • (2003) Computer and Security
    • Joo, D.1    Hong, T.2    Lee, S.3    Han, I.4
  • 21
    • 70349443411 scopus 로고    scopus 로고
    • DSS for computer security incident response applying CBR and collaborative response
    • Huy K. K., Kwang H. I. and Sang C. P., DSS for computer security incident response applying CBR and collaborative response, Expert Systems with Applications. 37 (2010) 852-870.
    • (2010) Expert Systems with Applications , vol.37 , pp. 852-870
    • Huy, K.K.1    Kwang, H.I.2    Sang, C.P.3
  • 22
    • 84950419860 scopus 로고
    • Advances in record linking methodology as applied to the 1985 census of Tampa Florida
    • Jaro, M. E., Advances in record linking methodology as applied to the 1985 census of Tampa Florida, Journal of the American Statistical Society. 84 (1989) 414-420.
    • (1989) Journal of the American Statistical Society , vol.84 , pp. 414-420
    • Jaro, M.E.1
  • 23
    • 0012866045 scopus 로고    scopus 로고
    • The state of record linkage and current research problems, Statistics of Income Division
    • R99/04
    • Winkler, W. E., The state of record linkage and current research problems, Statistics of Income Division, Internal Revenue Service Publication. R99/04 (1999).
    • (1999) Internal Revenue Service Publication
    • Winkler, W.E.1
  • 24
    • 0019887799 scopus 로고
    • Identification of Common Molecular Subsequences
    • Smith, T. F. and Waterman, M. S., Identification of Common Molecular Subsequences, Journal of Molecular Biology. 147 (1981) 195-197.
    • (1981) Journal of Molecular Biology , vol.147 , pp. 195-197
    • Smith, T.F.1    Waterman, M.S.2
  • 28
    • 84896842600 scopus 로고    scopus 로고
    • Smartcard-based Remote User Authentication Protocol with Improved Security
    • Dae-Sik Park, Smartcard-based Remote User Authentication Protocol with Improved Security, Journal of The Korea Knowledge Information Technology Society, 6, 4(2011)27-34
    • (2011) Journal of The Korea Knowledge Information Technology Society , vol.6 , Issue.4 , pp. 27-34
    • Park, D.-S.1
  • 29
    • 84896835507 scopus 로고    scopus 로고
    • Classification Criteria and Application Methodology for Evaluating IT Security Products
    • Ki-Seok Bang, Classification Criteria and Application Methodology for Evaluating IT Security Products, Journal of The Korea Knowledge Information Technology Society, 6, 5(2011)105-112
    • (2011) Journal of The Korea Knowledge Information Technology Society , vol.6 , Issue.5 , pp. 105-112
    • Bang, K.-S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.