메뉴 건너뛰기




Volumn 61, Issue , 2016, Pages 26-36

Unifying intrusion detection and forensic analysis via provenance awareness

Author keywords

False alarm; Forensic analysis; Intrusion detection; Provenance

Indexed keywords

ALARM SYSTEMS; ERRORS; GRAPHIC METHODS; MERCURY (METAL);

EID: 84960429448     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.02.005     Document Type: Article
Times cited : (32)

References (63)
  • 1
  • 2
    • 85026951138 scopus 로고    scopus 로고
    • Heartbleed, http://www.bbc.com/news/technology-26969629.
    • Heartbleed
  • 4
    • 84940401467 scopus 로고    scopus 로고
    • Probabilistic anomaly detection based on system call analysis
    • P. Maciolek, P. Krol, and J. Kozlak Probabilistic anomaly detection based on system call analysis Comput. Sci. J. 8 2007
    • (2007) Comput. Sci. J. , vol.8
    • Maciolek, P.1    Krol, P.2    Kozlak, J.3
  • 5
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S.A. Hofmeyr, S. Forrest, and A. Somayaji Intrusion detection using sequences of system calls J. Comput. Secur. 6 3 1998 151 180
    • (1998) J. Comput. Secur. , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 7
    • 16644376937 scopus 로고    scopus 로고
    • Forensic computer analysis: An introduction
    • 72-75
    • D. Farmer, and W. Venema Forensic computer analysis: An introduction Dr. Dobb's J. 25 9(Sept.) 2000 70 72-75
    • (2000) Dr. Dobb's J. , vol.25 , Issue.9 Sept , pp. 70
    • Farmer, D.1    Venema, W.2
  • 10
    • 84858835658 scopus 로고    scopus 로고
    • Trio: A system for integrated management of data, accuracy, and lineage
    • Asilomar, CA, January
    • J. Widom, Trio: A system for integrated management of data, accuracy, and lineage, in: Proc. of CIDR, Asilomar, CA, January, 2005, pp. 262-276.
    • (2005) Proc. of CIDR , pp. 262-276
    • Widom, J.1
  • 13
    • 84995516093 scopus 로고    scopus 로고
    • SPADE: Support for provenance auditing in distributed environments
    • December
    • A. Gehani, D. Tariq, SPADE: Support for provenance auditing in distributed environments, in: Proc. of ACM/IFIP/USENIX Middleware, December 2012.
    • (2012) Proc. of ACM/IFIP/USENIX Middleware
    • Gehani, A.1    Tariq, D.2
  • 15
    • 84960326695 scopus 로고    scopus 로고
    • Composing lineage metadata with xml for custom satellite-derived data products
    • June
    • R. Bose, J. Frew, Composing lineage metadata with xml for custom satellite-derived data products, in: Proc. of IEEE SSDBM, June 2004.
    • (2004) Proc. of IEEE SSDBM
    • Bose, R.1    Frew, J.2
  • 19
    • 80052652946 scopus 로고    scopus 로고
    • Trusted computing and provenance: Better together
    • J. Lyle, A. Martin, Trusted computing and provenance: Better together, in: Proc. of USENIX Tapp, 2010.
    • (2010) Proc. of USENIX Tapp
    • Lyle, J.1    Martin, A.2
  • 20
    • 85062006160 scopus 로고    scopus 로고
    • The case of the fake picasso: Preventing history forgery with secure provenance
    • June
    • R. Hasan, R. Sion, M. Winslett, The case of the fake picasso: Preventing history forgery with secure provenance, in: Proc. of USENIX FAST, June 2009.
    • (2009) Proc. of USENIX FAST
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 24
    • 85026956168 scopus 로고    scopus 로고
    • DARPA data sets, http://www.ll.mit.edu/ideval/data/.
    • DARPA Data Sets
  • 25
    • 85026951775 scopus 로고    scopus 로고
    • UNM data sets, http://www.cs.unm.edu/~immsec/systemcalls.htm.
    • UNM Data Sets
  • 27
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • January
    • W. Lee, S.J. Stolfo, Data mining approaches for intrusion detection, in: Proc. of USENIX Security, January 1998.
    • (1998) Proc. of USENIX Security
    • Lee, W.1    Stolfo, S.J.2
  • 28
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • D. Wagner, D. Dean, Intrusion detection via static analysis, in: Proc. of IEEE SP, 2001.
    • (2001) Proc. of IEEE SP
    • Wagner, D.1    Dean, D.2
  • 29
    • 1342274727 scopus 로고    scopus 로고
    • A fast automation-based method for detecting anomalous program behaviors
    • May
    • E. Sekar, M. Bendre, D. Dhurjati, P. Bollineni, A fast automation-based method for detecting anomalous program behaviors, in: Proc. of IEEE SP, May 2001.
    • (2001) Proc. of IEEE SP
    • Sekar, E.1    Bendre, M.2    Dhurjati, D.3    Bollineni, P.4
  • 31
    • 84960357745 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry access
    • October
    • F. Apap, A. Honig, S. Hershkop, E. Eskin, S. Stolfo, Detecting malicious software by monitoring anomalous windows registry access, in: Proc. of RAID, October 2002.
    • (2002) Proc. of RAID
    • Apap, F.1    Honig, A.2    Hershkop, S.3    Eskin, E.4    Stolfo, S.5
  • 33
    • 33845599591 scopus 로고    scopus 로고
    • On the learning of system call attributes for host-based anomaly detection
    • G. Tandon, and P.K. Chan On the learning of system call attributes for host-based anomaly detection Int. J. Artif. Intell. Tools 15 6 2006 875 892
    • (2006) Int. J. Artif. Intell. Tools , vol.15 , Issue.6 , pp. 875-892
    • Tandon, G.1    Chan, P.K.2
  • 34
    • 84950151731 scopus 로고    scopus 로고
    • Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis
    • Z. Gu, K. Pei, Q. Wang, L. Si, X. Zhang, D. Xu, Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis, in: Proc. of IEEE/IFIP DSN, 2015.
    • (2015) Proc. of IEEE/IFIP DSN
    • Gu, Z.1    Pei, K.2    Wang, Q.3    Si, L.4    Zhang, X.5    Xu, D.6
  • 35
    • 84994210095 scopus 로고    scopus 로고
    • A formal framework for program anomaly detection
    • X. Shu, D. Yao, B.G. Ryder, A formal framework for program anomaly detection, in: Proc. of RAID, 2015.
    • (2015) Proc. of RAID
    • Shu, X.1    Yao, D.2    Ryder, B.G.3
  • 37
    • 84914145282 scopus 로고    scopus 로고
    • Pratical evasion of a learning-based classifier: A case study
    • N. Srndic, P. Laskov, Pratical evasion of a learning-based classifier: A case study, in: Proc. of IEEE SP, 2014.
    • (2014) Proc. of IEEE SP
    • Srndic, N.1    Laskov, P.2
  • 43
    • 84988573115 scopus 로고
    • The design and implementation of tripwire: A file system integrity checker
    • November
    • G.H. Kim, E.H. Spafford, The design and implementation of tripwire: A file system integrity checker, in: Proc. of ACM CCS, November 1994.
    • (1994) Proc. of ACM CCS
    • Kim, G.H.1    Spafford, E.H.2
  • 45
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • October
    • H. Yin, D. Song, M. Egele, C. Kruegel, E. Kirda, Panorama: Capturing system-wide information flow for malware detection and analysis, in: Proc. of ACM CCS, October 2007.
    • (2007) Proc. of ACM CCS
    • Yin, H.1    Song, D.2    Egele, M.3    Kruegel, C.4    Kirda, E.5
  • 46
    • 49449113941 scopus 로고    scopus 로고
    • Design, implementation and evaluation of repairable file service
    • June
    • N. Zhu, T. Chiueh, Design, implementation and evaluation of repairable file service, in: Proc. of IEEE/IFIP DSN, June 2003.
    • (2003) Proc. of IEEE/IFIP DSN
    • Zhu, N.1    Chiueh, T.2
  • 47
    • 0036709428 scopus 로고    scopus 로고
    • Recovery from malicious transactions
    • P. Ammann, S. Jajodia, and P. Liu Recovery from malicious transactions TKDE 14 5 2002 1167 1185
    • (2002) TKDE , vol.14 , Issue.5 , pp. 1167-1185
    • Ammann, P.1    Jajodia, S.2    Liu, P.3
  • 49
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • T. Garfinkel, M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, in: Proc. of NDSS, 2003.
    • (2003) Proc. of NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 54
    • 62749161358 scopus 로고    scopus 로고
    • Introducing secure provenance: Problems and challenges
    • October
    • R. Hasan, R. Sion, M. Winslett, Introducing secure provenance: Problems and challenges, in: Proc. of ACM StorageSS, October 2007.
    • (2007) Proc. of ACM StorageSS
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 56
    • 80052666462 scopus 로고    scopus 로고
    • A formal framework for provenance security
    • J. Cheney, A formal framework for provenance security, in: Proc. of IEEE CSF, 2011.
    • (2011) Proc. of IEEE CSF
    • Cheney, J.1
  • 57
    • 85026951967 scopus 로고    scopus 로고
    • Do you know where your data's been? - Tamper-evident database provenance
    • J. Zhang, A. Chapman, K. Lefevre, Do you know where your data's been? - tamper-evident database provenance, in: Proc. of SDM, 2010.
    • (2010) Proc. of SDM
    • Zhang, J.1    Chapman, A.2    Lefevre, K.3
  • 59
    • 84897743314 scopus 로고    scopus 로고
    • Secure provenance transmission for streaming data
    • S. Sultana, M. Shehab, and E. Bertino Secure provenance transmission for streaming data IEEE TKDE 25 8 2012 1890 1903
    • (2012) IEEE TKDE , vol.25 , Issue.8 , pp. 1890-1903
    • Sultana, S.1    Shehab, M.2    Bertino, E.3
  • 60
    • 84874905603 scopus 로고    scopus 로고
    • Towards secure provenance-based access control in cloud environments
    • A. Bates, B. Mood, M. Valafar, K. Butler, Towards secure provenance-based access control in cloud environments, in: Proc. of CODASPY, 2013.
    • (2013) Proc. of CODASPY
    • Bates, A.1    Mood, B.2    Valafar, M.3    Butler, K.4
  • 61
    • 77954472312 scopus 로고    scopus 로고
    • Secure provenance: The essential of bread and butter of data forensics in cloud computing
    • April
    • R. Lu, X. Lin, X. Liang, X. Shen, Secure provenance: The essential of bread and butter of data forensics in cloud computing, in: Proc. of ACM ASIACCS, April 2010.
    • (2010) Proc. of ACM ASIACCS
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 62
    • 84880174811 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • May
    • C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models, in: Proc. of IEEE SP, May 1999.
    • (1999) Proc. of IEEE SP
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3
  • 63
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L.R. Rabiner A tutorial on hidden Markov models and selected applications in speech recognition Proc. IEEE 77 2 1989 257 286
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.