메뉴 건너뛰기




Volumn , Issue , 2003, Pages

A Virtual Machine Introspection Based Architecture for Intrusion Detection

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; NETWORK ARCHITECTURE; NETWORK SECURITY; VIRTUAL MACHINE;

EID: 85080362568     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1099)

References (54)
  • 1
    • 4344622709 scopus 로고    scopus 로고
    • Runtime process infection
    • Anonymous. ar-ticle 8 of 18, December
    • Anonymous. Runtime process infection. Phrack, 11(59):ar-ticle 8 of 18, December 2002.
    • (2002) Phrack , vol.11 , Issue.59
  • 2
    • 85180530043 scopus 로고    scopus 로고
    • Interface promiscuity obscurity
    • Apk. article 10 of 15, July
    • Apk. Interface promiscuity obscurity. Phrack, 8(53):article 10 of 15, July 1998.
    • (1998) Phrack , vol.8 , Issue.53
  • 16
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • June
    • R. Goldberg. Survey of virtual machine research. IEEE Computer Magazine, 7:34–45, June 1974.
    • (1974) IEEE Computer Magazine , vol.7 , pp. 34-45
    • Goldberg, R.1
  • 18
    • 85180538577 scopus 로고    scopus 로고
    • Bypassing integrity checking systems
    • halflife. article 9 of 17, September
    • halflife. Bypassing integrity checking systems. Phrack, 7(51):article 9 of 17, September 1997.
    • (1997) Phrack , vol.7 , Issue.51
  • 23
    • 84930451551 scopus 로고    scopus 로고
    • Backdooring binary objects
    • klog. article 9 of 16, May
    • klog. Backdooring binary objects. Phrack, 10(56):article 9 of 16, May 2000.
    • (2000) Phrack , vol.10 , Issue.56
  • 25
    • 85180538819 scopus 로고    scopus 로고
    • Building into the linux network layer
    • article July
    • l. kossack. Building into the linux network layer. Phrack, 9(55):article 12 of 19, July 1999.
    • (1999) Phrack , vol.9 , Issue.55 , pp. 12of19
    • kossack, l.1
  • 27
    • 85180530575 scopus 로고    scopus 로고
    • lrk5.src.tar.gz
    • Lord Somer. lrk5.src.tar.gz, Linux rootkit V. http://packetstorm.decepticons.org.
    • Linux rootkit V
    • Somer, Lord1
  • 30
    • 85180532809 scopus 로고    scopus 로고
    • Mission Critical Linux. Core Analysis Suite v3.3. http://oss.missioncriticallinux.com/projects/crash/.
    • Core Analysis Suite v3.3
  • 32
    • 85180533893 scopus 로고    scopus 로고
    • Advances in kernel hacking
    • arti-cle 6 of 15, December
    • palmers. Advances in kernel hacking. Phrack, 11(58):arti-cle 6 of 15, December 2001.
    • (2001) Phrack , vol.11 , Issue.58
  • 33
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435–2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 40
    • 84872311782 scopus 로고    scopus 로고
    • Linux on-the-fly kernel patching without lkm
    • sd. article 7 of 15, December
    • sd. Linux on-the-fly kernel patching without lkm. Phrack, 11(58):article 7 of 15, December 2001.
    • (2001) Phrack , vol.11 , Issue.58
  • 52
    • 84944248021 scopus 로고    scopus 로고
    • Intrusion detection using variable length audit trail patterns
    • A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable length audit trail patterns. In RAID 2000, pages 110–129, 2000.
    • (2000) RAID 2000 , pp. 110-129
    • Wespi, A.1    Dacier, M.2    Debar, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.