주소기반 분류기법을 통한 효과적인 침입상황 분석 도구

  • 김민수 (전남대학교) ;
  • 노봉남 (전남대학교 전자컴퓨터정보통신공학부) ;
  • 서정택 (국가보안기술연구소 정보보증연구부) ;
  • 박응기 (국가보안기술연구소 정보보증연구부)
  • 발행 : 2005.01.30

초록

키워드

참고문헌

  1. Ning, P., 'Techniques and Tools for Analyzing Intrusion Alerts,' ACM Transactions on Information and System Security, Vol.7 No.2, pp 274-318, 2004
  2. Moh, W., Kim, M., Cheong, I., Noh, B., Seo, J., Park, E. and Park, C., 'An Analysis on the Correlation of Network-based Alerts with Association Rule Algorithm,' WISA 2004, pp.705-712, 2004
  3. Debar, H. and Wespi, A., 'Aggregation and Correlation of Intrusion-Detection Alerts,' RAID 2001, Oct., 2001
  4. Porras, P. and Neumann, P., 'EMERALD : Event Monitoring Enabling Responses To Anomalous Live Disturbances,' Proc. of the 20th National Information Systems Security Conference, pp 1-13, 1997
  5. Valdes, A. and Skinner, K., 'An Approach to Sensor Correlation,' RAID 2000, Oct 2000
  6. Valdes, A. and Skinner, K., 'Probabilistic Alert Correlation,' RAID 2001, Oct., 2001
  7. Beale, J., Foster, J., Posluns, J. and Caswell, B., Snort 2.0 Intrusion Detection, SynGress, 2003