Automatic Response to Intrusion Detection

作者: Morten Haug , Pål Erik Eng

DOI:

关键词:

摘要:

参考文章(21)
Udo W. Pooch, Curtis A. Carver, Adaptive agent-based intrusion response Texas A&M University. ,(2001)
Jack Koziol, Intrusion Detection with Snort ,(2003)
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD to Date ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 73- 80 ,(1999)
Klaus-Peter Kossakowski, Julia Allen, Christopher Alberts, Cory Cohen, Gary Ford, Responding to Intrusions Defense Technical Information Center. ,(1999) , 10.21236/ADA360500
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok, Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. ,vol. 10, pp. 5- 22 ,(2002) , 10.3233/JCS-2002-101-202
Serge Fenet, Salima Hassas, A distributed Intrusion Detection and Response System based on mobile autonomous agents using social insects communication paradigm Electronic Notes in Theoretical Computer Science. ,vol. 63, pp. 41- 58 ,(2002) , 10.1016/S1571-0661(04)80336-0
G.B. White, E.A. Fisch, U.W. Pooch, Cooperating security managers: a peer-based intrusion detection system IEEE Network. ,vol. 10, pp. 20- 23 ,(1996) , 10.1109/65.484228
Manuel Castells, The rise of the network society ,(1996)
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, S. Bagchi, E. Spafford, ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment dependable systems and networks. pp. 508- 517 ,(2005) , 10.1109/DSN.2005.17