메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 22-31

Managing alerts in a multi-intrusion detection environment

Author keywords

Bayesian methods; Electrical capacitance tomography; Environmental management; Face detection; Forensics; Intrusion detection; Merging; Network servers; Proposals; Real time systems

Indexed keywords

BAYESIAN NETWORKS; ELECTRIC IMPEDANCE TOMOGRAPHY; ENVIRONMENTAL MANAGEMENT; FACE RECOGNITION; INTERACTIVE COMPUTER SYSTEMS; MERCURY (METAL); MERGING; REAL TIME SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84922794799     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2001.991518     Document Type: Conference Paper
Times cited : (211)

References (22)
  • 1
    • 0003907293 scopus 로고    scopus 로고
    • McMillan Technical Publishing
    • R. Bace. Intrusion Detection. McMillan Technical Publishing, 2000
    • (2000) Intrusion Detection
    • Bace, R.1
  • 2
    • 84949250180 scopus 로고    scopus 로고
    • Insider detection: Using confidentiality security policies for information flow analysis
    • J. Carrère, F. Cuppens, M.-H. Huang and C. Saurel. Insider Detection: Using Confidentiality Security Policies for Information Flow Analysis. In preparation
    • Preparation
    • Carrère, J.1    Cuppens, F.2    Huang, M.-H.3    Saurel, C.4
  • 12
    • 24744463914 scopus 로고    scopus 로고
    • Using key string and neural networks to reduce false alarms and detect new attacks with sniffer-based intrusion detection systems
    • Purdue, USA, October
    • R. Lippmann. Using Key String and Neural Networks to Reduce False Alarms and Detect New Attacks with Sniffer-Based Intrusion Detection Systems. Second International Workshop on the Recent Advances in Intrusion Detection (RAID'99), Purdue, USA, October 1999
    • (1999) Second International Workshop on the Recent Advances in Intrusion Detection (RAID'99)
    • Lippmann, R.1
  • 14
    • 0030643035 scopus 로고    scopus 로고
    • Continuous assessment of a unix configuration: Integrating intrusion detection and configuration analysis
    • San Diego, USA, February
    • A. Mounji and B. Le Charlier. Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis. ISOC'97 Symposium on Network and Distributed System Security, San Diego, USA, February 1997
    • (1997) ISOC'97 Symposium on Network and Distributed System Security
    • Mounji, A.1    Le Charlier, B.2
  • 17
    • 33845424965 scopus 로고    scopus 로고
    • Emerald: Event monitoring enabling responses to anomalous live disturbances
    • P. Porras and P. Neumann. Emerald: Event Monitoring Enabling Responses to Anomalous Live Disturbances. National Security Conference, 1997
    • (1997) National Security Conference
    • Porras, P.1    Neumann, P.2
  • 18
    • 1642293015 scopus 로고    scopus 로고
    • Snort-lightweight intrusion detection for networks
    • November
    • M. Roesch. Snort-Lightweight Intrusion Detection for Networks. USENIX LISA'99, November 1999
    • (1999) USENIX LISA'99
    • Roesch, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.