Real-Time File Integrity Checker for Intrusion Recovery and Response System |
Jeun Sanghoon
((주)엠엠씨테크놀로지 연구원)
Hur Jinyoung ((주)엠엠씨테크놀로지 연구원) Choi Jongsun (숭실대학교 컴퓨터학과) Choi Jaeyoung (숭실대학교 컴퓨터학부) |
1 | D. Curry and H. Debar, 'Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition,' http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-10.txt, 2003 |
2 | Common Intrusion Detection Framework, http://www.isi.edu/gost/cidf |
3 | Curtis A. Carver, Jr., Udo W. Pooch, 'An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response,' Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, 2000 |
4 | LMBench, http://www.bitmover.com/lmbench/, 1998 |
5 | Active Networks Intrusion Detection and Response (AN-IDR), http://www.isso.sparta.com/research/documents/anidr.pdf |
6 | Dan Schnackenberg, Kelly Djahandari and Dan Sterne, 'Infrastructure for Intrusion Detection and Response,' Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX-I) 2000, 2000 DOI |
7 | Kenneth R. van Wyk & Richard Forno, Incident Response, O'Reilly & Associates, Inc., 2001 |
8 | 해킹바이러스 통계 및 분석 월보, http://www.certcc.or.kr/statistics/2003/0308_statistics.pdf, 2003. 8 |
9 | CERT/CC Statistics 1988-2004, http://www.cert.org/stat/cert_stat.html |
10 | Pragmatic/THC, (nearly) Complete Linux Loadable Kernel Modules, http://www.thehackerschoice.com/papers/LKM_HACKING.html, 1999 |
11 | C. Wright, C. Cowan, J. Morris, S. Smalley, G. Kroah-Hartman, 'Linux Security Modules: General Security Support for the Linux Kernel,' USENIX Security Symposium, 2002 |
12 | B. Feinstein, G. Matthews, J. White, 'The Intrusion Detection Exchange Protocol (IDXP),' http://www.ietf.org/internet-drafts/draft-ietf-idwg-beep-idxp-07.txt, 2002 |
13 | 전상훈, 최재영, 김세환, 심원태, 'LxBSM: C2 수준의 감사 자료 생성을 위한 리눅스 기반 동적 커널 모듈의 설계 및 구현', 정보과학회논문지: 컴퓨팅의 실제, 제10권 제2호, pp.146-155, 2004. 4 과학기술학회마을 |
14 | Snare, http://www.intersectalliance.com/projects/Snare/. 2001 |
15 | Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, 'Intrusion Detection using Sequences of System Calls,' University of New Mexico, 1998 |
16 | Sun Microsystems, SunShield Basic Security Module Guide, Sun Microsystems, 1998 |
17 | NeoGuard ESM, http://www.inzen.com/kor/products/neoguard/intor.asp |
18 | Gene H. Kim, Eugene H. Spafford, 'The Design and Implementation of Tripwire: A File System Integrity Checker,' COAST Laboratory, Purdue University, 1994 |
19 | Integrit, http://integrit.sourceforge.net/ |
20 | Intrusion Detection Working Group, http://www.ietf.org/html.chaters/idwg-charter.html |
21 | Suhoshin IDS, http://www.securesoft.co.kr/english/product/idc_02.html |
22 | D. Schnackengerg and K Djahandari, 'Cooperative Intrusion Traceback and Response Architecture,' Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX II), pp.56-68, June, 200l DOI |