메뉴 건너뛰기




Volumn , Issue , 1999, Pages

A study in using neural networks for anomaly and misuse detection

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; COMPUTER CRIME; NEURAL NETWORKS;

EID: 85084160308     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (254)

References (23)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James Anderson Co., Fort Washington, PA, April
    • J.P. Anderson. Computer security threat monitoring and surveillance. Technical Report Technical Report, James P. Anderson Co., Fort Washington, PA, April 1980.
    • (1980) Technical Report Technical Report
    • Anderson, J.P.1
  • 5
    • 85036529638 scopus 로고    scopus 로고
    • Intrusion detection: Applying machine learning to solaris audit data
    • Los Alamitos, CA, December IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ
    • D. Endler. Intrusion detection: Applying machine learning to solaris audit data. In Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), pages 268-279, Los Alamitos, CA, December 1998. IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ.
    • (1998) Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98) , pp. 268-279
    • Endler, D.1
  • 13
    • 34548807057 scopus 로고    scopus 로고
    • A pattern matching mo del for misuse intrusion detection
    • Project, Purdue University
    • S. Kumar and E.H. Spafford. A pattern matching mo del for misuse intrusion detection. The COAST Project, Purdue University, 1996.
    • (1996) The COAST
    • Kumar, S.1    Spafford, E.H.2
  • 17
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T.F. Lunt. A survey of intrusion detection techniques. Computers and Security, 12:405-418, 1993.
    • (1993) Computers and Security , vol.12 , pp. 405-418
    • Lunt, T.F.1
  • 21
    • 84873309550 scopus 로고
    • Penetration state transition analysis - A rule-based intrusion detection approach
    • IEEE Computer So ciety Press, November
    • P.A. Porras and R.A. Kemmerer. Penetration state transition analysis - a rule-based intrusion detection approach. In Eighth Annual Computer Security Applications Conference, pages 220-229. IEEE Computer So ciety Press, November 1992.
    • (1992) Eighth Annual Computer Security Applications Conference , pp. 220-229
    • Porras, P.A.1    Kemmerer, R.A.2
  • 23
    • 85019504940 scopus 로고    scopus 로고
    • Netstat: A network-based intrusion detection approach
    • Los Alamitos, CA, December IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ
    • G. Vigna and R.A. Kemmerer. Netstat: A network-based intrusion detection approach. In Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), pages 25-34, Los Alamitos, CA, December 1998. IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ.
    • (1998) Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98) , pp. 25-34
    • Vigna, G.1    Kemmerer, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.