1 |
W. Lee and S. J. Stolfo. 'Data mining approaches for intrusion detection,' In In Proceedings of the 1998 USENIX Security Symposium. 1998
|
2 |
Eric Bloedorn 외 'Data Mining for Network Intrusion Detection ; How to Get Started,' The MITRE Corporation, In http://www.afcea.org/pastevents/db2001/BIoedorn_files/frame.htm, 2001
|
3 |
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, 'A Data Mining Framework for Building Intrusion Detection Models,' IEEE Symposium on Security and Privacy, In http://citeseer.nj.nec.com/154973.html, 1999
DOI
|
4 |
http://www.snort.org/
|
5 |
http://www.tcpdump.org/
|
6 |
Paul E. Proctor, 'The Practical Intrusion Detection Handbook,' Prentice Hall PTR, www.phptr.com, Feb., 2000
|
7 |
이경하 외, '네트워크 패킷 정보를 기반으로한 보안 관리', 한국정보과학회논문지, Vol.25, No.12, pp.1405-1412, Dec., 1998
|
8 |
Ramakrishnan Srikant, Rakesh Agrawal, 'Mining Generalized Association Rules,' Proceedings of the 21st VLDB Conference, IBM Almaden Research Center, 1995
|
9 |
김화수, '지능정보시스템 개론', 국방대학교, May, 2001
|
10 |
Tamas Abraham, 'IDDM : Intrusion Detection using Data Mining Techniques,' In Information Technology Division Electronics & Surveillance Research Laboratory, 2001
|
11 |
Kristin R. Nauta and Frank Lieble, 'Offline Network lntrution Detection; Mining tcpdump Data to Identify,' In http://www.sas.com/service/library/onlinedoc/itsv/intrusion.pdf, 1999
|