메뉴 건너뛰기




Volumn , Issue , 2002, Pages 64-73

Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis

Author keywords

Internet; Intrusion detection

Indexed keywords

DISCRIMINANT ANALYSIS; INTERNET; MERCURY (METAL); MONITORING;

EID: 84950109260     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAINT.2002.994451     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 1
    • 84950123814 scopus 로고    scopus 로고
    • http://www.ipa.go.jp/STC/ida
  • 2
    • 0033075710 scopus 로고    scopus 로고
    • Information-gathering with mobile agents for an intrusion detection system
    • Feb.
    • M. Asaka, "Information-Gathering with Mobile Agents for an Intrusion Detection System", Systems and Computers in Japan, Vol. 30 No. 2, pp. 31 - pp. 37, Feb. 1999.
    • (1999) Systems and Computers in Japan , vol.30 , Issue.2 , pp. 31-37
    • Asaka, M.1
  • 3
    • 0001748596 scopus 로고    scopus 로고
    • Local attack detection and intrusion route tracing
    • Nov.
    • M. Asaka, M. Tsuchiya, T. Onabuta, S. Okazawa, and S. Goto, "Local Attack Detection and Intrusion Route Tracing", IEICE Trans. Commun., Vol. E82-B No. 11, pp. 1826-1833, Nov. 1999.
    • (1999) IEICE Trans. Commun. , vol.E82-B , Issue.11 , pp. 1826-1833
    • Asaka, M.1    Tsuchiya, M.2    Onabuta, T.3    Okazawa, S.4    Goto, S.5
  • 5
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion detection using sequences of system calls", Computer Security Vol. 6, pp 151-180, 1998.
    • (1998) Computer Security , vol.6 , pp. 151-180
    • Hofmeyr, S.A.1    Somayaji, A.2    Forrest, S.3
  • 6
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • Orlando, FL, 5-9 Dec.
    • C. Ko, G. Fink, K. Levitt, "Automated detection of vulnerabilities in privileged programs by execution monitoring". Proc. of the 10th Annual Computer Security Applications Conference, pp. 134-144, Orlando, FL, 5-9 Dec. 1994.
    • (1994) Proc. of the 10th Annual Computer Security Applications Conference , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 7
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based Approach
    • C. Ko, M. Ruschitzka, and K. Levitt, "Execution monitoring of security-critical programs in distributed systems: a specification-based Approach", Proc. IEEE Symposium on Security and Privacy, pp. 134-144, 1997.
    • (1997) Proc. IEEE Symposium on Security and Privacy , pp. 134-144
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 8
    • 0001474381 scopus 로고
    • The statistical utilization of multiple measurements
    • R. A. Fisher, "The Statistical Utilization of Multiple Measurements." Annals of Eugenics, 8 pp. 376-386, 1938.
    • (1938) Annals of Eugenics , vol.8 , pp. 376-386
    • Fisher, R.A.1
  • 10
    • 84950134887 scopus 로고    scopus 로고
    • http://www.esumi.co.jp
  • 11
    • 0035338003 scopus 로고    scopus 로고
    • A new intrusion detection method based on discriminant analysis
    • May
    • M. Asaka et al., "A New Intrusion Detection Method Based on Discriminant Analysis", IEICE Trans, on Information & Systems, Vol. E-84-B No. 5, pp. 570-577, May 2001.
    • (2001) IEICE Trans, on Information & Systems , vol.E-84-B , Issue.5 , pp. 570-577
    • Asaka, M.1
  • 12
    • 84879799188 scopus 로고
    • Estimation of error rate in discriminant analysis
    • P. A. Lachenbruch and M. R. Mickey, "Estimation of Error Rate in Discriminant Analysis." Technometrics, 10, no. 1 pp. 1-10, 1968.
    • (1968) Technometrics , vol.10 , Issue.1 , pp. 1-10
    • Lachenbruch, P.A.1    Mickey, M.R.2
  • 13
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach", IEEE Trans. Software Engineering, Vol. 21, No. 3, pp. 181-199, 1995
    • (1995) IEEE Trans. Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 15
    • 0000133998 scopus 로고
    • An analysis of transformations
    • G. Box and D. Cox, "An analysis of transformations", J. Royal Statistical Society (B), 26, no. 2 pp. 211-252. 1964
    • (1964) J. Royal Statistical Society (B) , vol.26 , Issue.2 , pp. 211-252
    • Box, G.1    Cox, D.2
  • 16
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • D. E. Denning, '"An Intrusion-Detection Model", IEEE Trans. Engineering, Vol. SE-13. No. 2, pp. 222-232, 1987.
    • (1987) IEEE Trans. Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 17
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May/June
    • B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection", IEEE Network, vol. 8, No. 3, May/June pp. 26-41, 1994
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.