1 |
Julia Allen, Alan Christie,William Fithen, John McHugh, Jed Pickel, and Ed Stoner. State of the Practice of Intrusion Detection Technologies. Technical Report 99tr028, Carnegie Mellon - Software Engineering Institute, 2000.
|
2 |
Adriano M. Cansian, Artur R. A. da Silva, Marcelo de Souza : An Attack Signature Model To Computer Security Intrusion Detection. IEEE 2002.
|
3 |
Internet Engineering Task Force - Common Intrusion Detection Signature Standard. http://tools.ietf.org/html/draft-wierzbicki-cidss-05. SeptXMber 4, .
|
4 |
Common Vulnerability Exposure, http://cve.mitre.org/
|
5 |
BugtraqID, http://www.securityfocus.com
|
6 |
http://xforce.iss.net/xforce/xfdb/2019
|
7 |
http://www.metasploit.com
|
8 |
http://www.remote-exploit.org
|
9 |
http://www.emergingthreats.net
|
10 |
http://www.colasoft.com
|
11 |
Eric Frimpong, M.H.MacGregor, "A Performance Study of the Snort IDS," TR08-04, Department of Computing Science, University of Alberta, Feb, 2008.
|
12 |
L. Perrochon. Using context-based correlation in network operations management. Technical report, Stanford University Department of Computer Science, 1999. http://pavg.stanford.edu/cep/ cidf.ps.gz.
|
13 |
Eugene H. Spafford and Diego Zamboni, Intrusion detection using autonomous agents, Elsevier, Computer Networks, 34(4):547-570, October 2000.
DOI
ScienceOn
|
14 |
Eugene H. Spafford and Diego Zamboni, Intrusion detection using autonomous agents, Elsevier, Computer Networks, 34(4):547-570, October 2000.
DOI
ScienceOn
|
15 |
H.A. Kim and B. Karp, "Autograph: Toward Automated, Distributed, Worm Signature Detection," 13th Usenix Security Symposium, 2004.
|
16 |
Philip A Porras and Peter G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th National Information SystXMs Security Conference, pages 353.365, Baltimore, Maryland, USA, 7.10 October 1997. NIST, National Institute of Standards and Technology/National Computer Security Center.
|
17 |
Undercoer, J.L., Perich, F., Nicholas, C.: SHOMAR: An Open Architecture for Distributed Intrusion Detection Services. Technical report, University of Maryland, Baltimore County (2002).
|
18 |
C. Kreibich and J Crowcroft, "Honeycomb - Creating Intresion Detection Signatures Using Honeypots," Workshop on Hot Topics in Networks, 2003.
|
19 |
S. Sinh, et. al., "Automated Worm Fingerprinting," 6th Symposium on Operating System Design and Implementation, 2004.
|
20 |
오진태, 김익균, 장종수, 전용희, "제로데이 웜 공격 대 응을 위한 ZASMIN 시스템 구조", 한국정보보호학회, 제18권 제1호, 2008. 2.
과학기술학회마을
|