메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 234-244

Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS

Author keywords

Bayesian network based detection; Event correlation; False alarms; Intrusion detection; Missed alarms

Indexed keywords

ALARM SYSTEMS; BAYESIAN NETWORKS; BUFFER STORAGE; COMPUTER CRIME; ERRORS; GRAPHIC METHODS; MANAGERS; MERCURY (METAL); NETWORK LAYERS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84944738739     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2003.1254328     Document Type: Conference Paper
Times cited : (128)

References (19)
  • 4
    • 84867339043 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • Oakland, USA
    • F. Cuppens and A. Miege, "Alert Correlation in a Cooperative Intrusion Detection Framework", In IEEE Symposium on Security and Privacy, Oakland, USA, 2002.
    • (2002) IEEE Symposium on Security and Privacy
    • Cuppens, F.1    Miege, A.2
  • 5
    • 2642519111 scopus 로고
    • The privilege graph: An extension to the typed access matrix model
    • (D. Gollman, Ed.), Lecture Notes in Computer Science, Springer-Verlag, Brighton, UK, November
    • M. Dacier and Y. Deswarte, "The Privilege Graph: an Extension to the Typed Access Matrix Model", in European Symposium in Computer Security (ESORICS'94), (D. Gollman, Ed.), Lecture Notes in Computer Science, 875, pp.319-334, Springer-Verlag, Brighton, UK, November 1994.
    • (1994) European Symposium in Computer Security (ESORICS'94) , vol.875 , pp. 319-334
    • Dacier, M.1    Deswarte, Y.2
  • 6
    • 0012945946 scopus 로고    scopus 로고
    • Models and tools for quantitative assessment of operational security
    • (S.K. Katsikas and D. Gritzalis, Eds.), Chapman & Hall, Samos (Greece), May
    • M. Dacier, Y. Deswarte and M. Kaâniche, "Models and Tools for Quantitative Assessment of Operational Security", in 12th International Information Security Conference (IFIP/SEC'96), (S.K. Katsikas and D. Gritzalis, Eds.), pp.177-186, Chapman & Hall, Samos (Greece), May 1996.
    • (1996) 12th International Information Security Conference (IFIP/SEC'96) , pp. 177-186
    • Dacier, M.1    Deswarte, Y.2    Kaâniche, M.3
  • 8
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • T. Verwoerd and R. Hunt, "Intrusion Detection Techniques and Approaches", In Computer Communications vol. 25, Issue 15, 2002.
    • (2002) Computer Communications , vol.25 , Issue.15
    • Verwoerd, T.1    Hunt, R.2
  • 14
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Rodolphe Ortalo and Yves Deswarte and Mohamed Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security", Journal of Software Engineering, vol. 25, no. 5, pp. 633-650, 1999.
    • (1999) Journal of Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 15
    • 85090433665 scopus 로고    scopus 로고
    • Snort - lightweight intrusion detection for networks
    • November
    • M. Roesch, "Snort - Lightweight Intrusion Detection for Networks", In Proceedings of USENIX LISA'99, November 1999.
    • (1999) Proceedings of USENIX LISA'99
    • Roesch, M.1
  • 16


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.