메뉴 건너뛰기




Volumn , Issue , 2014, Pages 806-809

Intrusion detection and prevention system: Challenges & opportunities

Author keywords

Architecture; Attack; Detection; IDS; Prevention; Security; System; Virus

Indexed keywords

ARCHITECTURE; COMPUTER VIRUSES; ERROR DETECTION; INFORMATION TECHNOLOGY; NETWORK ARCHITECTURE; SOCIETIES AND INSTITUTIONS; SURVEYS; VIRUSES;

EID: 84903850727     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IndiaCom.2014.6828073     Document Type: Conference Paper
Times cited : (29)

References (19)
  • 1
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • Debar, Hervé, Marc Dacier, and Andreas Wespi. "Towards a taxonomy of intrusion-detection systems." Computer Networks 31.8 (1999): 805-822.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 7
    • 84903824061 scopus 로고    scopus 로고
    • Inc. Stalker, the company's website at
    • Haystack Labs, Inc. Stalker, available from the company's website at http://www.haystack.com/stalk.htm, 1997.
    • (1997) Haystack Labs
  • 8
    • 84903840170 scopus 로고    scopus 로고
    • Inc. RealSecure, Internet
    • Internet Security Systems, Inc. RealSecure, Internet http://www.iss.net/ prod/rsds.html, 1997.
    • (1997) Internet Security Systems
  • 10
    • 85141038051 scopus 로고    scopus 로고
    • Mining audit data to build intrusion detection models
    • Lee, Wenke, Salvatore J. Stolfo, and Kui W. Mok. "Mining Audit Data to Build Intrusion Detection Models." KDD. 1998.
    • (1998) KDD
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 12
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • Helman, Paul, and Gunar Liepins. "Statistical foundations of audit trail analysis for the detection of computer misuse." Software Engineering, IEEE Transactions on 19.9 (1993): 886-901.
    • (1993) Software Engineering, IEEE Transactions on , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 13
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Ilgun, Koral, Richard A. Kemmerer, and Phillip A. Porras. "State transition analysis: A rule-based intrusion detection approach." Software Engineering, IEEE Transactions on 21.3 (1995): 181-199.
    • (1995) Software Engineering, IEEE Transactions on , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 18
    • 2142714171 scopus 로고    scopus 로고
    • Resilient infrastructure for network security
    • Williamson, Matthew M. "Resilient infrastructure for network security." Complexity 9.2 (2003): 34-40.
    • (2003) Complexity , vol.9 , Issue.2 , pp. 34-40
    • Williamson, M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.