Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt

作者: Steven Noel , Duminda Wijesekera , Charles Youman

DOI: 10.1007/978-1-4615-0953-0_1

关键词:

摘要: … of intrusion detection: general detection strategy (misuse … been applied to signature-based intrusion detection for many years… That is, the intrusion detection system has attack signatures …

参考文章(54)
G.E. Liepens, H.S. Vaccaro, Intrusion detection: Its role and validation Computers & Security. ,vol. 11, pp. 347- 355 ,(1992) , 10.1016/0167-4048(92)90175-Q
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)
Sushil Jajodia, Daniel Barbará, Ningning Wu, DETECTING NOVEL NETWORK INTRUSIONS USING BAYES ESTIMATORS siam international conference on data mining. pp. 0- 0 ,(2001)
Leonard J. LaPadula, Compendium of Anomaly Detection and Reaction Tools and Projects Defense Technical Information Center. ,(2000) , 10.21236/ADA460206
Jia-Ling Lin, X.S. Wang, S. Jajodia, Abstraction-based misuse detection: high-level specifications and adaptable strategies ieee computer security foundations symposium. pp. 190- 201 ,(1998) , 10.1109/CSFW.1998.683169
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD to Date ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 73- 80 ,(1999)
Jiahai Yang, Peng Ning, X. Sean Wang, Sushil Jajodia, CARDS: A Distributed System for Detecting Coordinated Attacks information security. pp. 171- 180 ,(2000) , 10.1007/978-0-387-35515-3_18
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
Eugene H. Spafford, Ivan Krsul, Todd Ellis, Mark Crosbie, Bryn Dole, IDIOT - Users Guide ,(1996)