참고문헌
- Lee, W., Stolfo, S. J., 'A data mining framework for building intrusion detection models,' IEEE Symposium on Security and Privacy, pp. 209-220, 1999
- Safavi-Naini, R., Balachadran, B., 'Case-based reasoning for intrusion detection,' 12th Annual Computer Security Application Conference, pp. 214-223, 1996
- Denning, D. E., 'An intrusion detection model,' IEEE Trans. S. E., SE-13(2), pp. 222-232, 1987 https://doi.org/10.1109/TSE.1987.232894
- Richards, K., 'Network based intrusion detection: a review of technologies,' Computer and Security, pp. 671-682, 1999
- Debar, H., Dacier, M., 'Towards a taxonomy of intrusion detection systems,' Computer Networks, pp. 805-822, 1989
- Debar, H., Becker, M., 'A neural network component for an intrusion detection system,' IEEE Computer Society Symposium Research in Security and Privacy, pp. 240-250, 1992
- Weber, R., 'Information Systems Control and Audit,' IEEE Symposium on Security and Privacy, pp. 120-128, 1999
- Lippmann, R. P., 'Improving intrusion detection performance using keyword selection and neural networks,' Computer Networks, Vol. 24, pp. 597-603, 2000
- Jasper, R. J., Huang, M. Y., 'A large scale distributed intrusion detection framework based on attack strategy analysis,' Computer Networks, Vol. 31, pp. 2465-2475, 1999 https://doi.org/10.1016/S1389-1286(99)00114-0
- Ilgun, K., Kemmerer, R. A., 'Ustat: a real time intrusion system for UNIX,' Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 16-28, 1993
- Hubbards, B., Haley, T., McAuliffe, L., Schaefer, L., Kelem, N., Walcott, D., Feiertag, R., Schaefer, M., 'Computer system intrusion detection,' Computer Networks, pp. 120-128, 1990
- Vaccaro, H. S., 'Detection of anomalous computer session activity,' Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 280-289, 1989
- Helman, P., 'Statistical foundations of audit trail analysis for the detection of computer misuse,' IEEE Transactions on software engineering, Vol. 19, pp. 861-901, 1993
- Lee, S. Y. and Kim, Y. S., 'Design and analysis of probe detection systems for TCP networks,' International Journal of Advanced Computational Intelligence & Intelligent Informatics, Vol. 8, pp. 369-372, 2004 https://doi.org/10.20965/jaciii.2004.p0369
- Lee, S. Y., An Adaptive probe detection model using fuzzy cognitive maps, Ph. D. Dissertation, Daejeon University, 2003
- Maxion, R. A., 'Masquerade detection truncated command lines,' International Conference on Dependable Systems and Networks, pp. 219-228, 2002