메뉴 건너뛰기




Volumn , Issue , 1998, Pages 259-267

Detecting anomalous and unknown intrusions against programs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEM FIREWALLS; INTRUSION DETECTION; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 85019678573     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.1998.738646     Document Type: Conference Paper
Times cited : (200)

References (16)
  • 1
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis and implications
    • [D'haeseleer et al., 1996]
    • [D'haeseleer et al., 1996] D'haeseleer, P., Forrest, S., and Helman, P. (1996). An immunological approach to change detection: Algorithms, analysis and implications. In IEEE Symposium on Security and Privacy.
    • (1996) IEEE Symposium on Security and Privacy
    • D'Haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 5
    • 0030104449 scopus 로고    scopus 로고
    • Artificial neural networks: A tutorial
    • [Jain et al., 1996]
    • [Jain et al., 1996] Jain, A., Mao, J., and Mohiuddin, K. M. (1996). Artificial neural networks: A tutorial. IEEE Computer, 29(3):31-33.
    • (1996) IEEE Computer , vol.29 , Issue.3 , pp. 31-33
    • Jain, A.1    Mao, J.2    Mohiuddin, K.M.3
  • 6
    • 34548807057 scopus 로고    scopus 로고
    • A pattern matching model for misuse intrusion detection
    • [Kumar and Spafford, 1996], Purdue University
    • [Kumar and Spafford, 1996] Kumar, S. and Spafford, E. (1996). A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University.
    • (1996) The COAST Project
    • Kumar, S.1    Spafford, E.2
  • 8
    • 85045324611 scopus 로고
    • [Lippmann, 1991] , chapter Part 1, IEEE Press, Piscataway, NJ. in Neural Networks Theoretical Foundations and Analysis
    • [Lippmann, 1991] Lippmann, R. (1991). An Introduc-tion to Computing with Neural Nets, chapter Part 1, pages 5-23. IEEE Press, Piscataway, NJ. in Neural Networks Theoretical Foundations and Analysis.
    • (1991) An Introduction to Computing with Neural Nets , pp. 5-23
    • Lippmann, R.1
  • 9
    • 1842709394 scopus 로고
    • Ides: An intelligent system for detecting intruders
    • [Lunt, 1990] , Threat and Coun-termeasures. Rome, Italy
    • [Lunt, 1990] Lunt, T. (1990). Ides: an intelligent system for detecting intruders. In Proceedings of the Symposium: Computer Security, Threat and Coun-termeasures. Rome, Italy.
    • (1990) Proceedings of the Symposium: Computer Security
    • Lunt, T.1
  • 10
    • 0027609384 scopus 로고
    • A survey of intru-sion detection techniques
    • [Lunt, 1993]
    • [Lunt, 1993] Lunt, T. (1993). A survey of intru-sion detection techniques. Computers and Security, 12:405-418.
    • (1993) Computers and Security , vol.12 , pp. 405-418
    • Lunt, T.1
  • 15
    • 84873309550 scopus 로고
    • Penetration state transition analysis - A rule-based intrusion detection approach
    • [Porras and Kemmerer, 1992], IEEE Computer Soci-ety Press
    • [Porras and Kemmerer, 1992] Porras, P. and Kemmerer, R. (1992). Penetration state transition analysis -a rule-based intrusion detection approach. In Eighth Annual Computer Security Applications Conference, pages 220-229. IEEE Computer Soci-ety Press.
    • (1992) Eighth Annual Computer Security Applications Conference , pp. 220-229
    • Porras, P.1    Kemmerer, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.