메뉴 건너뛰기




Volumn 2006-May, Issue , 2006, Pages 65-71

A formal approach to sensor placement and configuration in a network intrusion detection system

Author keywords

Formal model; Intrusion detection systems; Network analysis; Sensor configuration; Sensor placement

Indexed keywords

COMPUTER CRIME; ELECTRIC NETWORK ANALYSIS; MERCURY (METAL); SOFTWARE ENGINEERING;

EID: 84953403259     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1137627.1137638     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 4
    • 35248861643 scopus 로고    scopus 로고
    • Topology-based detection of anomalous BGP messages
    • C. Krugel, D. Mutz, W. Robertson, and F. Valeur. Topology-based detection of anomalous BGP messages. In Proc. of RAID, pages 17-35, 2003.
    • (2003) Proc. of RAID , pp. 17-35
    • Krugel, C.1    Mutz, D.2    Robertson, W.3    Valeur, F.4
  • 5
    • 0038349213 scopus 로고    scopus 로고
    • Sensor-based intrusion detection for intra-domain distance-vector routing
    • V. Mittal and G. Vigna. Sensor-based intrusion detection for intra-domain distance-vector routing. In Proc. of CCS 2002, pages 127-137, 2002.
    • (2002) Proc. of CCS 2002 , pp. 127-137
    • Mittal, V.1    Vigna, G.2
  • 8
    • 0033718255 scopus 로고    scopus 로고
    • Using model checking to analyze network vulnerabilities
    • R. W. Ritchey and P. Ammann. Using model checking to analyze network vulnerabilities. In IEEE Symp. on Security and Privacy, pages 156-165, 2000.
    • (2000) IEEE Symp. on Security and Privacy , pp. 156-165
    • Ritchey, R.W.1    Ammann, P.2
  • 9
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • November
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In Proc. of the 13th Conf. on Systems Administration, pages 229-238, November 1999.
    • (1999) Proc. of the 13th Conf. on Systems Administration , pp. 229-238
    • Roesch, M.1
  • 11
    • 33646385863 scopus 로고    scopus 로고
    • A framework based approach for formal modeling and analysis of multi-level attacks in computer networks
    • G. Rothmaier and H. Krumm. A framework based approach for formal modeling and analysis of multi-level attacks in computer networks. In Proc. of FORTE, pages 247-260, 2005.
    • (2005) Proc. of FORTE , pp. 247-260
    • Rothmaier, G.1    Krumm, H.2
  • 13
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna and R. A. Kemmerer. NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security, 7(1):37-71, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 14
    • 1542286890 scopus 로고    scopus 로고
    • Designing and implementing a family of intrusion detection systems
    • G. Vigna, F. Valeur, and R. A. Kemmerer. Designing and implementing a family of intrusion detection systems. In Proc. of FSE/ESEC, pages 88-97, 2003.
    • (2003) Proc. of FSE/ESEC , pp. 88-97
    • Vigna, G.1    Valeur, F.2    Kemmerer, R.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.