Intrusion Detection System of Network Based on Biological Immune System |
Sim, Kwee-Bo
(중앙대학교 전자전기공학부)
Yang, Jae-Won (중앙대학교 전자전기공학부) Lee, Dong-Wook (중앙대학교 전자전기공학부) Seo, Dong-Il (한국전자통신연구원 사이버테러기술 분석팀) Choi, Yang-Seo (한국전자통신연구원 사이버테러기술 분석팀) |
1 | C. Warrender, S. Forrest, B. pearmutter, "Detecting intrusions using system calls: Alternative data models," IEEE Symposium on security and Privac, 1999. |
2 | Computer Emergency Response Team, "TCP SYN Flooding and IP Spoofing Attacks," CERT Advisory: CA, pp. 96-21, 1996. |
3 | W. Stevens, TCP/IP Illustrated, vol. 1, Addison Wesley Publishing, Company, 1994. |
4 | J. B. Gu, D. W. Lee, K. B. Sim, and S. H. Park, "An Immunity-based Security Layer against Internet Antigens," Transactions on IEICE, vol. E83-B, no.11, pp. 2570-2575, 2000. |
5 | S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequence of System Calls." Journal of Computer Security, vol. 6, pp.151-180, 1998. |
6 | A. Somayaji, S. Hofmeyr, and S. Forrest, "Principles of a Computer Immune System," New Security Paradigms Workshop, pp. 75-82, 1998. |
7 | D. Dasgupta, and S. Forrest, " An Anomaly Detection Algorithm Inspired by the Immune Systems and Their Applications," Springer, pp. 262-276, 1999. |
8 | P.D' haeseleer, S, Forrest, and P. Helman. "An immunological approach to change detection: Algorithms, analysis and implication," Proceeding of the 1996 IEEE Symposium on Research in Security and Privacy, Los Alami. 1996. |