1 |
J. B. D. Cabrera, L. Lewis, and R.K. Mehara. Detection and classification of intrusion and faults using sequences of system calls. ACM SIGMOD Record, 30(4),2001
|
2 |
S.A. Hofmeyer, A. Somayaji and S.Forrest, "Intrusion Detection Using Sequences of System Calls", Journal of Computer Security Vol.6, pp. 151-180,1998
ScienceOn
|
3 |
http://www.ll.mit.edu/mission/
|
4 |
G. Casas-Garriga, P. Diaz, and J.L. Balcazar. ISSA : An integreated system for sequence analysis. Technical Report DELIS-TR-Ol03, Universitat Paderbom, 2005
|
5 |
ChetanParampalli, R. Sekar, Rob Johnson, A practical mimicry attack against powerful system-call monitors, Proceedings of the 2008 ACM symposium on fuformation, computer and communications security, March 18-20,2008, Tokyo, Japan
|
6 |
양대일, "정보 보안 개론과 실습", 한빛미디어, 2003
|
7 |
C. Kruegel, D. Mutz, EValeur, and G. Vigna. On the Detection of Anomalous System Call Arguments. In Proceedings of the 2003 European Symposium on Research in Computer Security, Gjovik, Norway, October 2003
|
8 |
S. Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff, A Sense of Self for Unix Process, In Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, Los Alamos, CA, pp. 120-128. IEEE Computer Society Press
|
9 |
D.E. Denning. An Intrusion-detection model. IEEE Transactions on Software Engineering, SE-13(2): 222-232, February 1987
DOI
ScienceOn
|
10 |
Anil Somayaji and Stephanie Forrest. Automated response using systemcall delays. In Proceedings of the 9th USENIX Security Symposium, Denver, CO, August 2000
|
11 |
Stephanie Forrest, Alan S. Perelson, Lawrence Allen, and Rajesh Cherukuri. Self-nonself discrimination in a computer. In SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy, page 202, Washington, DC, USA, 1994.IEEE Computer Society
|
12 |
N.Ye and Q.Chen. An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International, 17(2):105-112,2001
DOI
ScienceOn
|
13 |
Mark Burgess, Har 다 Haugerud, Sigmund Straumsnes, and Trond Reitan. Measuring system normality. ACM Trans. Comput. Syst., 20(2):125-160, 2002
DOI
ScienceOn
|
14 |
D. Wagner and P. Soto. Mimicry attacks on host based intrusion detection systems. In 9th ACM Conference on Computer and Communications Security, Washington, DC, pp. 18-22, Nov. 2002
|
15 |
ETRI, 침입탐지시스템(IDS), 정보통신연구진흥원 학술정보 주간기술동향 1027호, Nov, 2001
|