References
- A Comparative Analysis of Current Intrusion Detection Technologies James Cannady;Jay Harrell
- Computer Security Applications Conference Case-Based Reasoning for Intrusion Detection Mansour Esmaili;Rei Safavi-Naini
- Technical Report Software Agents for Intrusion Detection Jai Sundar B;Spafford E.
- 한국정보처리학회 논문지 v.6 no.5 분산 침입 탐지 에이전트를 기반으로 한 지능형 침입탐지시스템 설계 이종성;채수환
- 정보보호센터 정보보호 뉴스 v.13 침입탐지 기술 분류 및 기술적 구성요소 은유진;박정호
- Applying Genetic Programming to Intrusion Detection Crosbie M;Spafford E
- IEEE Transactions on Software Engineering v.19 no.9 Statistical foundations of audit trail analysis for the detection of computer misuse Paul Helman;Gunar Liepins
- In Proceedings of the 1989 IEEE Symposium on Research in Security and Privacy Detection of anomalous computer session activity H.S. Vaccaro;G.E. Liepins
- In Proceedings of the 13th National Computer Security Conference The ComputerWatch data reduction tool Cheri Dowell;Paul Ramstedt
- Network Security Journal v.1 no.1 SECURENET:A network-oriented intelligent intrusion prevention and detection system Paul Spirakis(et al.)
- Journal of Computer Security v.6 Lightweight Intrusion Detection for Networked Operating Systems S. A. Hofmeyr;A. Somayaji;S. Forrest
- New Security Paradigms Workshop Principles of a Computer immune System A. Somayaji;S. Hofmeyr;S. Forrest
- Execution Monitoring of security-critical programs in a distributed system : A specification-based approach Calvin Cheuk Wang Ko
- UNIX 프로그래밍 기술- SVR4 시스템 프로그래밍의 이론과 실제 정진욱;안성진
- Sun Security Bulletin #00169
- http://www.rootshell.com/archive-j457nxiqu3gq59dv/199707/psrace.c.html
- http://161.53.42.3/~crv/security/bugs/SunOS/rdist6.html
- http://www.rootshell.com/archive-j457nxiqi3gq59dv/199807/solaris-sendmail-8.8.4.sh.html
- SunSHIELD Basic Security Module Guide Sunsoft, Mountain View
- IEEE Software v.14 no.5 Intrusion Detection via System Call Traces Kosoresow AP;S. Hofmeyr
- Man Pages: Rdist - remote file distribution program Sun Microsystem