메뉴 건너뛰기




Volumn 2516, Issue , 2002, Pages 219-238

Attacks against computer network: Formal grammar-based framework and simulation tool

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; COMPUTATIONAL GRAMMARS; COMPUTER CRIME; COMPUTER NETWORKS; CONTEXT FREE GRAMMARS; FORMAL SPECIFICATION; INTRUSION DETECTION; MACHINE COMPONENTS; MERCURY (METAL); MULTI AGENT SYSTEMS; SECURITY SYSTEMS; SOFTWARE AGENTS; SPECIFICATIONS; STOCHASTIC MODELS; STOCHASTIC SYSTEMS;

EID: 84958956850     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36084-0_12     Document Type: Conference Paper
Times cited : (47)

References (40)
  • 3
    • 0006103497 scopus 로고
    • A standard audit trail format. Technical report, Department of Computer Science
    • Bishop, M.: A standard audit trail format. Technical report, Department of Computer Science, University of California at Davis (1995)
    • (1995) University of California at Davis
    • Bishop, M.1
  • 4
    • 84969375078 scopus 로고    scopus 로고
    • Custom Attack Simulation Language (CASL). Secure Networks (1998)
    • (1998) Secure Networks
  • 5
    • 84958776699 scopus 로고    scopus 로고
    • Network Security Modeling and Cyber Attack Simulation Methodology. Lecture Notes in Computer Science
    • Chi, S.-D., Park, J.S., Jung, K.-C., Lee, J.-S.: Network Security Modeling and Cyber Attack Simulation Methodology. Lecture Notes in Computer Science, Vol.2119 (2001)
    • (2001) Vol , pp. 2119
    • Chi, S.-D.1    Park, J.S.2    Jung, K.-C.3    Lee, J.-S.4
  • 6
    • 0003112690 scopus 로고
    • Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions
    • Chung, M., Mukherjee, B., Olsson, R.A., Puketza, N.: Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions. Proceedings of the 18th NISSC (1995)
    • (1995) Proceedings of the 18Th NISSC
    • Chung, M.1    Mukherjee, B.2    Olsson, R.A.3    Puketza, N.4
  • 7
    • 0030701247 scopus 로고    scopus 로고
    • Information System Attacks: A Preliminary Classification Scheme
    • Cohen, F.B.: Information System Attacks: A Preliminary Classification Scheme. Computers and Security, Vol.16, No.1 (1997)
    • (1997) Computers and Security , vol.16 , Issue.1
    • Cohen, F.B.1
  • 10
    • 84969382914 scopus 로고    scopus 로고
    • Intrusion detection message exchange format, extensible markup language (Xml) document type definition
    • Curry, D.: Intrusion detection message exchange format, extensible markup language (xml) document type definition. draft-ietf-idwg-idmef-xml-02.txt (2000)
    • (2000) Draft-Ietf-Idwg-Idmef-Xml-02.Txt
    • Curry, D.1
  • 11
    • 2542563730 scopus 로고    scopus 로고
    • An experimentation workbench for intrusion detection systems
    • IBM Research Division, Zurich Research Laboratory
    • Debar, H., Dacier, M., Wespi, A., Lampart, S.: An experimentation workbench for intrusion detection systems. Research Report RZ-2998 (# 93044). IBM Research Division, Zurich Research Laboratory (1998)
    • (1998) Research Report RZ-2998 (# 93044)
    • Debar, H.1    Dacier, M.2    Wespi, A.3    Lampart, S.4
  • 17
    • 84969400039 scopus 로고    scopus 로고
    • Hailstorm. Users Manual, 1.0 (2000) http://www.clicktosecure.com/
    • (2000) Users Manual, 1.0
  • 18
    • 0003615205 scopus 로고    scopus 로고
    • A Common Language for Computer Security Incidents, SANDIA REPORT
    • Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents, SANDIA REPORT, SAND98-8667 (1998)
    • (1998) SAND98-8667
    • Howard, J.D.1    Longstaff, T.A.2
  • 19
    • 84969395962 scopus 로고    scopus 로고
    • A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. RAID’98
    • Huang, M.-Y., Wicks, T.M.: A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. RAID’98, Louvain-la-Neuve (1998)
    • (1998) Louvain-La-Neuve
    • Huang, M.-Y.1    Wicks, T.M.2
  • 21
    • 84969400037 scopus 로고    scopus 로고
    • User Guide
    • IDS Informer 3.0. User Guide. BLADE Software (2001)
    • (2001) BLADE Software
  • 25
    • 0030676601 scopus 로고    scopus 로고
    • How to Systematically Classify Computer Security Intrusion
    • IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA
    • Lindqvist, U., Jonsson, E.: How to Systematically Classify Computer Security Intrusions. Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA (1997)
    • (1997) Proceedings of The , vol.1997
    • Lindqvist, U.1    Jonsson, E.2
  • 29
    • 27244453070 scopus 로고    scopus 로고
    • Gassata, a genetic algorithm as an alternative tool for security audit trails analysis
    • Me, L.: Gassata, a genetic algorithm as an alternative tool for security audit trails analysis. RAID’98, Louvain-la-Neuve (1998)
    • (1998) RAID’98, Louvain-La-Neuve
    • Me, L.1
  • 33
    • 84969398307 scopus 로고    scopus 로고
    • http://www.ontology.org/
  • 35
    • 3643079262 scopus 로고    scopus 로고
    • A Software Platform for Testing Intrusion Detection Systems
    • Puketza, N., Chung, M., Olsson, R.A., Mukherjee, B.: A Software Platform for Testing Intrusion Detection Systems. IEEE Software, Vol.14, No.5 (1997)
    • (1997) IEEE Software , vol.14 , Issue.5
    • Puketza, N.1    Chung, M.2    Olsson, R.A.3    Mukherjee, B.4
  • 36
    • 33646162676 scopus 로고    scopus 로고
    • Distributed Metastasis: A Computer Network Penetration Methodology
    • (Phrack Magazine
    • Stewart, A.J.: Distributed Metastasis: A Computer Network Penetration Methodology. The Packet Factory (1999) (Phrack Magazine, Vol. 9, Issue 55)
    • (1999) The Packet Factory , vol.9 , Issue.55
    • Stewart, A.J.1
  • 38
    • 84959005836 scopus 로고    scopus 로고
    • Proceedings of the IEEE Information Survivability Workshop, Boston
    • Vigna, G., Eckmann, S.T., Kemmerer, R.A.: Attack Languages. Proceedings of the IEEE Information Survivability Workshop, Boston (2000)
    • (2000) Attack Languages
    • Vigna, G.1    Eckmann, S.T.2    Kemmerer, R.A.3
  • 40
    • 0034300584 scopus 로고    scopus 로고
    • Intrusiondetection for incident-response, using a military battlefield-intelligence process
    • Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., Asbery, J.: Intrusiondetection for incident-response, using a military battlefield-intelligence process. Computer Networks, No. 34 (2000)
    • (2000) Computer Networks , vol.34
    • Yuill, J.1    Wu, F.2    Settle, J.3    Gong, F.4    Forno, R.5    Huang, M.6    Asbery, J.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.