ANOMALY-BASED SECURITY PROTOCOL ATTACK DETECTION

作者: Tysen Glen Leckie

DOI:

关键词:

摘要:

参考文章(19)
A.K. Ghosh, J. Wanken, F. Charron, Detecting anomalous and unknown intrusions against programs annual computer security applications conference. pp. 259- 267 ,(1998) , 10.1109/CSAC.1998.738646
T.F. Lunt, R. Jagannathan, A prototype real-time intrusion-detection expert system ieee symposium on security and privacy. pp. 59- 66 ,(1988) , 10.1109/SECPRI.1988.8098
G. Lowe, Some new attacks upon security protocols Proceedings 9th IEEE Computer Security Foundations Workshop. pp. 162- 169 ,(1996) , 10.1109/CSFW.1996.503701
K. Ilgun, USTAT: a real-time intrusion detection system for UNIX ieee symposium on security and privacy. pp. 16- 28 ,(1993) , 10.1109/RISP.1993.287646
Peter G. Neumann, Phillip A. Porras, Ravenswood Avenue, EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances computer and communications security. pp. 245- 254 ,(2002)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
A. Jones, Song Li, Temporal signatures for intrusion detection annual computer security applications conference. pp. 252- 261 ,(2001) , 10.1109/ACSAC.2001.991541
Alec Yasinsac, An environment for security protocol intrusion detection Journal of Computer Security. ,vol. 10, pp. 177- 188 ,(2002) , 10.3233/JCS-2002-101-208
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496