메뉴 건너뛰기




Volumn , Issue , 2003, Pages 116-121

Hidden processes: The implication for intrusion detection

Author keywords

Computer architecture; Computer crime; Internet; Intrusion detection; Kernel; Operating systems; Security; Software engineering; Software systems

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CRIME; CYBERNETICS; INTERNET; INTRUSION DETECTION; MERCURY (METAL); NETWORK ARCHITECTURE; SOFTWARE ENGINEERING; TRANSFER FUNCTIONS;

EID: 84946403333     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMCSIA.2003.1232409     Document Type: Conference Paper
Times cited : (22)

References (23)
  • 5
    • 0008723266 scopus 로고    scopus 로고
    • Tech. Rep. Lawrence Livermore National Laboratory, February
    • Paul J. Criscuolo, "Distributed denial of service," Tech. Rep. CIAC-2319, Lawrence Livermore National Laboratory, February 2000.
    • (2000) Distributed Denial of Service
    • Criscuolo, P.J.1
  • 10
    • 84880174811 scopus 로고    scopus 로고
    • Detecting intrusion using system calls: Alternative data models
    • IEEE Computer Society Press
    • Christina Warrender, Stephanie Forrest, and Barak Pearlmutter, "Detecting intrusion using system calls: Alternative data models," in 1999 IEEE Symposium on Security and Privacy. 1999, pp. 133-145, IEEE Computer Society Press.
    • (1999) 1999 IEEE Symposium on Security and Privacy , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3
  • 11
    • 84958983572 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry accesses
    • Fifth International Symposium - Recent Advances in Intrusion Detection, A. Wespi, G. Vigna, and L. Deri, Eds. Springer
    • Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, and Sal Stolfo, "Detecting malicious software by monitoring anomalous windows registry accesses," in Fifth International Symposium - Recent Advances in Intrusion Detection, A. Wespi, G. Vigna, and L. Deri, Eds. 2002, number 2516 in LNCS, pp. 37-53, Springer.
    • (2002) LNCS , vol.2516 , pp. 37-53
    • Apap, F.1    Honig, A.2    Hershkop, S.3    Eskin, E.4    Stolfo, S.5
  • 13
    • 84946425247 scopus 로고    scopus 로고
    • Kstat
    • FuSyS
    • FuSyS, "Kstat," http://s0ftpj.org/en/site.html, KSTAT for Linux.
    • KSTAT for Linux
  • 14
    • 84946425248 scopus 로고    scopus 로고
    • Adore
    • Stealth
    • Stealth, "Adore," http://teso.scene.at/releases/adore-0.42.tgz, The Adore Root Kit.
    • The Adore Root Kit
  • 15
    • 79952248580 scopus 로고    scopus 로고
    • Dark-Angel
    • Dark-Angel, "Phantasmagoria," http://online.securityfocus.com/archive/1/290724.
    • Phantasmagoria


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.