메뉴 건너뛰기




Volumn 1999-January, Issue , 1999, Pages 146-161

Detecting computer and network misuse through the production-based expert system toolset (P-BEST)

Author keywords

[No Author keywords available]

Indexed keywords

C (PROGRAMMING LANGUAGE); COMPUTATIONAL LINGUISTICS; COMPUTER NETWORKS; DENIAL-OF-SERVICE ATTACK; EXPERT SYSTEMS; MERCURY (METAL); REAL TIME SYSTEMS;

EID: 84940110274     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.1999.766911     Document Type: Conference Paper
Times cited : (108)

References (20)
  • 2
  • 3
    • 84958742099 scopus 로고    scopus 로고
    • A tool for pro-Active defense against the buffer overrun attack
    • In J.-J. Quisquater et al. editors Louvainla-Neuve, Belgium Sept. 16-18. Springer-Verlag
    • D. Bruschi, E. Rosti, and R. Banfi. A tool for pro-Active defense against the buffer overrun attack. In J.-J. Quisquater et al., editors, Computer Security-Proceedings of ESORICS 98, volume 1485 of LNCS, pages 17-31, Louvainla-Neuve, Belgium, Sept. 16-18, 1998. Springer-Verlag
    • (1998) Computer Security-Proceedings of ESORICS 98 1485 of LNCS , pp. 17-31
    • Bruschi, D.1    Rosti, E.2    Banfi, R.3
  • 4
    • 0026850007 scopus 로고    scopus 로고
    • A neural network component for an intrusion detection system
    • Oakland, California, May 4-6, 1992 IEEE Computer Society Press
    • H. Debar, M. Becker, and D. Siboni. A neural network component for an intrusion detection system. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 240-250, Oakland, California, May 4-6, 1992. IEEE Computer Society Press
    • Proceedings of the 1992 IEEE Symposium on Security and Privacy , pp. 240-250
    • Debar, H.1    Becker, M.2    Siboni, D.3
  • 8
    • 0003685574 scopus 로고
    • Model-based intrusion detection
    • Washington, D.C Oct. 1-4. National Institute of Standards and Technology/National Computer Security Center
    • T. D. Garvey and T. F. Lunt. Model-based intrusion detection. In Proceedings of the 14th National Computer Security Conference, pages 372-385, Washington, D.C., Oct. 1-4, 1991. National Institute of Standards and Technology/National Computer Security Center
    • (1991) Proceedings of the 14th National Computer Security Conference , pp. 372-385
    • Garvey, T.D.1    Lunt, T.F.2
  • 9
    • 84969573885 scopus 로고
    • ASAX: Software architecture and rule-based language for universal audit trail analysis
    • In Y. Deswarte et al. editors Toulouse, France Nov. 23-25. Springer-Verlag
    • J. Habra, B. Le Charlier, A. Mounji, and I. Mathieu. ASAX: Software architecture and rule-based language for universal audit trail analysis. In Y. Deswarte et al., editors, Computer Security-Proceedings of ESORICS 92, volume 648 of LNCS, pages 435-450, Toulouse, France, Nov. 23-25, 1992. Springer-Verlag
    • (1992) Computer Security-Proceedings of ESORICS 92 648 of LNCS , pp. 435-450
    • Habra, J.1    Le Charlier, B.2    Mounji, A.3    Mathieu, I.4
  • 10
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Mar
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, Mar. 1995
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 11
    • 0039952569 scopus 로고
    • An expert system application for network intrusion detection
    • Washington, D.C Oct. 1-4. National Institute of Standards and Technology/National Computer Security Center
    • K. A. Jackson, D. H. DuBois, and C. A. Stallings. An expert system application for network intrusion detection. In Proceedings of the 14th National Computer Security Conference, pages 215-225, Washington, D.C., Oct. 1-4, 1991. National Institute of Standards and Technology/National Computer Security Center
    • (1991) Proceedings of the 14th National Computer Security Conference , pp. 215-225
    • Jackson, K.A.1    DuBois, D.H.2    Stallings, C.A.3
  • 12
    • 0026154682 scopus 로고    scopus 로고
    • The SRI IDES statistical anomaly detector
    • Oakland, California, May 20-22, 1991IEEE Computer Society Press
    • H. S. Javitz and A. Valdes. The SRI IDES statistical anomaly detector. In Proceedings of the 1991 IEEE Symposium on Security and Privacy, pages 316-326, Oakland, California, May 20-22, 1991. IEEE Computer Society Press
    • Proceedings of the 1991 IEEE Symposium on Security and Privacy , pp. 316-326
    • Javitz, H.S.1    Valdes, A.2
  • 15
    • 84873309550 scopus 로고
    • Penetration state transition analysis: A rule-based intrusion detection approach
    • San Antonio, Texas, Nov. 30-Dec IEEE Computer Society Press
    • P. A. Porras and R. A. Kemmerer. Penetration state transition analysis: A rule-based intrusion detection approach. In Proceedings of the Eighth Annual Computer Security Applications Conference, pages 220-229, San Antonio, Texas, Nov. 30-Dec. 4, 1992. IEEE Computer Society Press
    • (1992) Proceedings of the Eighth Annual Computer Security Applications Conference , vol.4 , pp. 220-229
    • Porras, P.A.1    Kemmerer, R.A.2
  • 16
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • San Antonio, Texas, Nov. 30-Dec Oct. 7-10. National Institute of Standards and Technology/National Computer Security Center
    • P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353-365, Baltimore, Maryland, Oct. 7-10 1997. National Institute of Standards and Technology/National Computer Security Center
    • (1997) Proceedings of the 20th National Information Systems Security Conference , pp. 353-365x
    • Porras, P.A.1    Neumann, P.G.2
  • 18
    • 2942645420 scopus 로고
    • Expert systems in intrusion detection: A case study
    • Oct. 17-20, Baltimore, Maryland. National Institute of Standards and Technology/National Computer Security Center
    • M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A. Whitehurst. Expert systems in intrusion detection: A case study. In Proceedings of the 11th National Computer Security Conference, pages 74-81, Baltimore, Maryland, Oct. 17-20, 1988. National Institute of Standards and Technology/National Computer Security Center
    • (1988) Proceedings of the 11th National Computer Security Conference , pp. 74-81
    • Sebring, M.M.1    Shellhouse, E.2    Hanna, M.E.3    Whitehurst, R.A.4
  • 19
    • 0003951499 scopus 로고
    • Sun Microsystems Inc., 2550 Garcia Avenue, Mountain View, CA 94043-1100, USA Nov
    • Sun Microsystems, Inc., 2550 Garcia Avenue, Mountain View, CA 94043-1100, USA. SunSHIELD Basic Security Module Guide, Nov. 1995
    • (1995) SunSHIELD Basic Security Module Guide
  • 20
    • 0024665277 scopus 로고    scopus 로고
    • Detection of anomalous computer session activity
    • Oakland, California, May 1-3, 1989IEEE Computer Society Press
    • H. S. Vaccaro and G. E. Liepins. Detection of anomalous computer session activity. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 280-289, Oakland, California, May 1-3, 1989. IEEE Computer Society Press
    • Proceedings of the 1989 IEEE Symposium on Security and Privacy , pp. 280-289
    • Vaccaro, H.S.1    Liepins, G.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.