A network security monitor

作者: L.T. Heberlein , G.V. Dias , K.N. Levitt , B. Mukherjee , J. Wood

DOI: 10.1109/RISP.1990.63859

关键词:

摘要: … A prototype LAN security monitor -- hereafter referred to as our Network Security … We have discussed an approach to obtaining network security based on … network activity. The need for a …

参考文章(16)
Donn B. Parker, Fighting computer crime ,(1983)
Dena Tensa, Typical weaknesses in operating system software Information Age archive. ,vol. 9, pp. 74- 78 ,(1987)
Clifford Stoll, Stalking the wily hacker Communications of the ACM. ,vol. 31, pp. 484- 497 ,(1988) , 10.1145/42411.42412
Robert M. Metcalfe, David R. Boggs, Ethernet Communications of the ACM. ,vol. 26, pp. 90- 95 ,(1983) , 10.1145/357980.358015
F. T. Grampp, R. H. Morris, TheUNIXSystem: UNIXOperating System Security AT&T Bell Laboratories Technical Journal. ,vol. 63, pp. 1649- 1672 ,(1984) , 10.1002/J.1538-7305.1984.TB00058.X
David B. Newman, Jim K. Omura, Raymond L. Pickholtz, Public key management for network security IEEE Network. ,vol. 1, pp. 11- 16 ,(1987) , 10.1109/MNET.1987.6434186
D. Estrin, Controls for Interorganization Networks IEEE Transactions on Software Engineering. ,vol. 13, pp. 249- 261 ,(1987) , 10.1109/TSE.1987.233149
Linda S. Rutledge, Lance J. Hoffman, A survey of issues in computer network security Computers & Security. ,vol. 5, pp. 296- 308 ,(1986) , 10.1016/0167-4048(86)90050-7
V. Voydock, S. Kent, Security in high-level network protocols IEEE Communications Magazine. ,vol. 23, pp. 12- 24 ,(1985) , 10.1109/MCOM.1985.1092606
H.S. Vaccaro, G.E. Liepins, Detection of anomalous computer session activity ieee symposium on security and privacy. pp. 280- 289 ,(1989) , 10.1109/SECPRI.1989.36302