메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Configurable middleware-level intrusion detection for embedded systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; EMBEDDED SYSTEMS; MIDDLEWARE; NETWORK SECURITY;

EID: 85116480404     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2005.52     Document Type: Conference Paper
Times cited : (9)

References (32)
  • 1
    • 0037886264 scopus 로고    scopus 로고
    • Application-integrated data collection for security monitoring
    • LNCS,. Davis, CA, October Springer
    • M. Almgren, and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In Proceeding of Recent Advances in Intrusion Detection (RAID), LNCS, pp. 22-26, Davis, CA, October 2001, Springer.
    • (2001) Proceeding of Recent Advances in Intrusion Detection (RAID) , pp. 22-26
    • Almgren, M.1    Lindqvist, U.2
  • 3
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, 201 West 103rd Street, Indianapolis, IN 46290
    • R. G. Bace. Intrusion Detection. Macmillan Technical Publishing, 201 West 103rd Street, Indianapolis, IN 46290.
    • Intrusion Detection
    • Bace, R.G.1
  • 4
    • 77953251243 scopus 로고    scopus 로고
    • SCADA vs. The hackers - Can freebie software and a can of Pringles bring down the US power grid?
    • December
    • A. S. Brown. “SCADA vs. the hackers - Can freebie software and a can of Pringles bring down the US power grid?” December 2002, Mechanical Engineering Magazine.
    • (2002) Mechanical Engineering Magazine
    • Brown, A.S.1
  • 5
  • 6
    • 85116437552 scopus 로고    scopus 로고
    • Online, website
    • Cylant Secure. Online, 2004, See website http://www.cylant.com.
    • (2004) Cylant Secure
  • 10
    • 0011016060 scopus 로고    scopus 로고
    • Cyber-attacks by al Qaeda feared
    • June 27
    • B. Gellman. Cyber-Attacks by Al Qaeda Feared. Washington Post Thurs., June 27, 2002; Page A01.
    • (2002) Washington Post Thurs , pp. A01
    • Gellman, B.1
  • 11
    • 85116417055 scopus 로고    scopus 로고
    • Online, website
    • IPTables. Online, 2004, See website http://www.netfilter.org.
    • (2004) IPTables
  • 12
    • 84883100660 scopus 로고    scopus 로고
    • The starfish system: Providing intrusion detection and intrusion tolerance for middleware systems
    • Guadalajara, Mexico, January
    • K. P. Kihlstrom, P. Narasimhan.”The Starfish System: Providing Intrusion Detection and Intrusion Tolerance for Middleware Systems,” IEEE Workshop on Object-oriented Realtime Dependable Systems, Guadalajara, Mexico, January 2003.
    • (2003) IEEE Workshop on Object-Oriented Realtime Dependable Systems
    • Kihlstrom, K.P.1    Narasimhan, P.2
  • 13
    • 0030703957 scopus 로고    scopus 로고
    • Unreliable intrusion detection in distributed computations
    • AT&T Labs June 10 12, Rockport, Massachusetts. USA
    • D. Malkhi, M. Reiter, AT&T Labs. “Unreliable Intrusion Detection in Distributed Computations” 10th Computer Security Foundations Workshop (CSFW '97), June 10 - 12, 1997, Rockport, Massachusetts. USA.
    • (1997) 10th Computer Security Foundations Workshop (CSFW '97)
    • Malkhi, D.1    Reiter, M.2
  • 17
    • 9244229011 scopus 로고    scopus 로고
    • A configurable security subsystem in a middleware framework for embedded systems
    • 20 December
    • A. D. McKinnon, D. E. Bakken, and J. C. Shovic, “A configurable security subsystem in a middleware framework for embedded systems,” Computer Networks, vol. 46, iss. 6, pp. 771-795, 20 December 2004.
    • (2004) Computer Networks , vol.46 , Issue.6 , pp. 771-795
    • McKinnon, A.D.1    Bakken, D.E.2    Shovic, J.C.3
  • 18
    • 85116488570 scopus 로고    scopus 로고
    • Online, 2 0 0 4, website
    • MicroQoSCORBA, Online, 2 0 0 4, See website http://microqoscorba.net
  • 20
    • 36248976561 scopus 로고    scopus 로고
    • Concerns about intrusions into remotely accessible substation controllers and SCADA systems
    • Paper #4, October 23-26, Spokane, WA
    • P. Oman, E. Schweitzer, and D. Frincke. “Concerns About Intrusions into Remotely Accessible Substation Controllers and SCADA Systems,” 27th Annual Western Protective Relay Conference, Paper #4, (October 23-26, Spokane, WA), 2000.
    • (2000) 27th Annual Western Protective Relay Conference
    • Oman, P.1    Schweitzer, E.2    Frincke, D.3
  • 24
    • 0003534056 scopus 로고    scopus 로고
    • Technical Report CS-99-17, Department of Computer Science, Univ. of Virginia, June
    • R. S. Sielken. “Application intrusion detection,” Technical Report CS-99-17, Department of Computer Science, Univ. of Virginia, June 1999.
    • (1999) Application Intrusion Detection
    • Sielken, R.S.1
  • 25
    • 85116500407 scopus 로고    scopus 로고
    • Online, website
    • Snort. Online, 2004, See website www.snort.org.
    • (2004)
  • 27
    • 11444261290 scopus 로고    scopus 로고
    • Data collection mechanisms for intrusion detection systems
    • CERIAS, Purdue University, 1315 Recitation Building,West Lafayette, IN, June
    • E. Spafford, D. Zamboni. “Data collection mechanisms for intrusion detection systems.” CERIAS Technical Report 2000-08, CERIAS, Purdue University, 1315 Recitation Building,West Lafayette, IN, June 2000.
    • (2000) CERIAS Technical Report 2000-08
    • Spafford, E.1    Zamboni, D.2
  • 28
    • 0002675748 scopus 로고    scopus 로고
    • Intrusion detection for distributed applications
    • July
    • M. Stillerman, C. Marceau, and M. Stillman. “Intrusion Detection for Distributed Applications,” Communications of the ACM, Vol. 42, No. 7, pp. 62-69, July, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.7 , pp. 62-69
    • Stillerman, M.1    Marceau, C.2    Stillman, M.3
  • 29
    • 0002106364 scopus 로고    scopus 로고
    • Embedding the Internet: Proactive computing
    • May
    • D. Tennenhouse. “Embedding the Internet: Proactive Computing,” Comm. of the ACM, May, 2000.
    • (2000) Comm. Of the ACM
    • Tennenhouse, D.1
  • 30
    • 85116424264 scopus 로고    scopus 로고
    • Online, website
    • TINI. Online, 2004. See website http://www.ibutton.com/TINI.
    • (2004)
  • 31
    • 21644452256 scopus 로고    scopus 로고
    • Prentice Hall, Professional Technical Reference, Upper Saddle River, NJ 07458
    • J. Turley. The Essential Guide to Semiconductors. Prentice Hall, 2003, Professional Technical Reference, Upper Saddle River, NJ 07458, www.phptr.com.
    • (2003) The Essential Guide to Semiconductors
    • Turley, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.