메뉴 건너뛰기




Volumn 220, Issue , 2013, Pages 2240-2254

Intrusion detection in distributed systems using fingerprinting and massive event correlation

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; COMPLEX NETWORKS; COMPUTER VIRUSES; DISTRIBUTED COMPUTER SYSTEMS; INTRUSION DETECTION; NETWORK LAYERS; NETWORK SECURITY; PALMPRINT RECOGNITION; SOCIAL COMPUTING;

EID: 84908283968     PISSN: 16175468     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (15)
  • 1
    • 84944721192 scopus 로고    scopus 로고
    • Log correlation for intrusion detection: A proof of concept
    • IEEE Computer Society
    • Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, and Kenneth E. Rowe. Log correlation for intrusion detection: A proof of concept. In ACSAC, pages 255-264. IEEE Computer Society, 2003.
    • (2003) ACSAC , pp. 255-264
    • Abad, C.1    Taylor, J.2    Sengul, C.3    Yurcik, W.4    Zhou, Y.5    Rowe, K.E.6
  • 2
    • 21644443181 scopus 로고    scopus 로고
    • Extracting attack manifestations to determine log data requirements for intrusion detection
    • Emilie Lundin Barse and Erland Jonsson. Extracting attack manifestations to determine log data requirements for intrusion detection. In ACSAC, pages 158-167, 2004.
    • (2004) ACSAC , pp. 158-167
    • Barse, E.L.1    Jonsson, E.2
  • 3
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • ACM
    • Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW, pages 551-560. ACM, 2009.
    • (2009) WWW , pp. 551-560
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 6
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • Pedro Garcia-Teodoro et al. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2):18-28, 2009.
    • (2009) Computers & Security , vol.28 , Issue.1-2 , pp. 18-28
    • Garcia-Teodoro, P.1
  • 7
    • 72049095903 scopus 로고    scopus 로고
    • A data correlation method for anomaly detection systems using regression relations
    • A. Hassanzadeh and B. Sadeghiyan. A data correlation method for anomaly detection systems using regression relations. In ICFIN, pages 242-248, 2009.
    • (2009) ICFIN , pp. 242-248
    • Hassanzadeh, A.1    Sadeghiyan, B.2
  • 8
    • 2442509056 scopus 로고    scopus 로고
    • Decentralized event correlation for intrusion detection
    • Christopher Kruegel, Thomas Toth, and Clemens Kerer. Decentralized event correlation for intrusion detection. In ICISC, pages 59-95. 2002.
    • (2002) ICISC , pp. 59-95
    • Kruegel, C.1    Toth, T.2    Kerer, C.3
  • 9
    • 32344452166 scopus 로고    scopus 로고
    • A comparative study of anomaly detection schemes in network intrusion detection
    • SIAM
    • Aleksandar Lazarevic, Levent Ertöz, Vipin Kumar, Aysel Ozgur, and Jaideep Srivastava. A comparative study of anomaly detection schemes in network intrusion detection. In SDM. SIAM, 2003.
    • (2003) SDM
    • Lazarevic, A.1    Ertöz, L.2    Kumar, V.3    Ozgur, A.4    Srivastava, J.5
  • 10
    • 84956982801 scopus 로고    scopus 로고
    • Learning fingerprints for a database intrusion detection system
    • Springer
    • Sin Yeung Lee, Wai Lup Low, and Pei Yuen Wong. Learning fingerprints for a database intrusion detection system. In ESORICS, pages 264-280. Springer, 2002.
    • (2002) ESORICS , pp. 264-280
    • Lee, S.Y.1    Low, W.L.2    Wong, P.Y.3
  • 12
    • 38549107133 scopus 로고    scopus 로고
    • Comparison of probabilistic boolean network and dynamic Bayesian network approaches for inferring gene regulatory networks
    • Peng Li, Chaoyang Zhang, Edward J. Perkins, Ping Gong, and Youping Deng. Comparison of probabilistic boolean network and dynamic bayesian network approaches for inferring gene regulatory networks. BMC Bioinformatics, 8(S-7), 2007.
    • (2007) BMC Bioinformatics , vol.8 , Issue.S7
    • Li, P.1    Zhang, C.2    Perkins, E.J.3    Gong, P.4    Deng, Y.5
  • 15
    • 84867677727 scopus 로고    scopus 로고
    • Designing a cyber attack information system for national situational awareness
    • Florian Skopik, Zhendong Ma, Paul Smith, and Thomas Bleier. Designing a cyber attack information system for national situational awareness. In Future Security, pages 277-288, 2012.
    • (2012) Future Security , pp. 277-288
    • Skopik, F.1    Ma, Z.2    Smith, P.3    Bleier, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.