NetSTAT: a network-based intrusion detection system

作者: Giovanni Vigna , Richard A. Kemmerer

DOI: 10.3233/JCS-1999-7103

关键词: Host-based intrusion detection systemIntrusionDistributed computingIntrusion detection systemComputer scienceNetwork forensicsNetwork intrusion detectionState (computer science)Anomaly-based intrusion detection systemFocus (computing)

摘要: … Intrusion detection is an approach to security that is also evolving towards networked environments. Intrusion detection began as a technique for detecting mas… of intrusion detection …

参考文章(21)
Phil Porras, STAT -- A State Transition Analysis Tool For Intrusion Detection University of California at Santa Barbara. ,(1993)
J. Postel, Transmission Control Protocol Internet Request for Comment (RFC793). ,vol. 793, pp. 1- 91 ,(1981)
Stephen E. Smaha, Terrance L. Goan, James Brentano, Daniel M. Teal, Karl N. Levitt, Biswanath Mukherjee, Steven R. Snapp, L. Todd Heberlein, Gihan V. Dias, Tim Grance, Che-Lin Ho, Doug Mansur, DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype Internet besieged. pp. 211- 227 ,(1997)
Richard A. Kemmerer, NSTAT: A Model-based Real-time Network Intrusion Detection System University of California at Santa Barbara. ,(1998)
J. Postel, User Datagram Protocol RFC768. ,vol. 768, pp. 1- 3 ,(1980)
David K. Hess, David R. Safford, Udo W. Pooch, A Unix network protocol security study: network information service acm special interest group on data communication. ,vol. 22, pp. 24- 28 ,(1992) , 10.1145/141809.141811
J.S. Balasubramaniyan, J.O. Garcia-Fernandez, D. Isacoff, E. Spafford, D. Zamboni, An architecture for intrusion detection using autonomous agents annual computer security applications conference. pp. 13- 24 ,(1998) , 10.1109/CSAC.1998.738563
L.T. Heberlein, G.V. Dias, K.N. Levitt, B. Mukherjee, J. Wood, D. Wolber, A network security monitor ieee symposium on security and privacy. pp. 296- 304 ,(1990) , 10.1109/RISP.1990.63859
G. Vigna, R.A. Kemmerer, NetSTAT: a network-based intrusion detection approach annual computer security applications conference. pp. 25- 34 ,(1998) , 10.1109/CSAC.1998.738566