Firewall monitoring using intrusion detection systems

作者: Şükran Asarcıklı

DOI:

关键词: Host-based intrusion detection systemComputer securityIntrusion prevention systemIntrusion detection systemComputer scienceFirewall (construction)

摘要:

参考文章(12)
Robert S. Sielken, Anita K. Jones, Computer System Intrusion Detection: A Survey ,(2000)
Elizabeth D. Zwicky, D. Brent Chapman, Deborah Russell, Building Internet Firewalls ,(1995)
John P. Wack, Guidelines on Firewalls and Firewall Policy National Institute of Standards and Technology. ,(2002) , 10.6028/NIST.SP.800-41
Behrouz A. Forouzan, TCP/IP Protocol Suite ,(1999)
Hervé Debar, Marc Dacier, Andreas Wespi, Towards a taxonomy of intrusion-detection systems Computer Networks. ,vol. 31, pp. 805- 822 ,(1999) , 10.1016/S1389-1286(98)00017-6
Stefan Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection computer and communications security. pp. 1- 7 ,(1999) , 10.1145/319709.319710
M. Worring, C.G.M. Snoek, F.J. Seinstra, D.C. Koelma, J.M. Geusebroek, NIST Special Publication Gaithersburg. ,(2005)
Reto E. Haeni, Firewall Penetration Testing ,(1997)
Rebecca Gurley Bace, Intrusion detection ,(1999)
Rebecca Gurley Bace, Peter Mell, None, Intrusion Detection Systems National Institute of Standards and Technology (U.S.). ,(2001) , 10.6028/NIST.SP.800-31