THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 104 |
Dung lượng | 2,79 MB |
Nội dung
Ngày đăng: 24/11/2016, 11:24
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
[14] Center, CERT Coordination. (CERT/CC). CERT/CC statistics 1988–2006, http://www.cert.org/stats. 2006 | Link | |
[3] Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera, (2009). A survey of coordinated attacks and collaborative intrusion detection, Department of Computer Science and Software Engineering. The University of Melbourne, 111 Barry Street, Ca | Khác | |
[4] Snapp S, Brentano J, Dias G, Goan T, Heberlein L, Ho C, et al. (1991). DIDS (distributed intrusion detection system) – motivation, architecture, and an early prototype. In: Proceedings of the 14th national computer security conference;pp.167–76 | Khác | |
[6] Kemmerer RA.NSTAT, Kemmerer, (2001). A model-based real-time network intrusion detection system. University of California at Santa Barbara; Tech. Rep.TRCS97-18 | Khác | |
[7] Heberlein LT, Mukherjee B, Levitt KN, (1992). Internetwork security monitor: an intrusion-detection system for large-scale networks. In: Proceedings of the 15th national computer security conference. pp. 262–71 | Khác | |
[8] Hochberg J, Jackson K, Stallings C, McClary JF, DuBois D, Ford J, (1993). Nadir: an automated system for detecting network intrusion and misuse. In:Proceedings of the 15th national computer security conference;pp. 235–48 | Khác | |
[9] Huang M, Jasper R, Wicks T, (1999). A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks; 31(23–24):2465–75 | Khác | |
[10] Mounji A, Le Charlier B, Zampunieris D, Habra N, (February 1995). Distributed audit trail analysis. In: Proceedings of the internet society symposium on network and distributed system security (ISOC); pp. 102–13 | Khác | |
[11] Staniford-Chen S, Cheung S, Crawford R, Dilger M, Frank J,Hoagland J, et al. (September 1996). Grids-a graph based intrusion detection system for large networks. In: Proceedings of the 19th national information systems security conference. vol. 1; pp. 361–70 | Khác | |
[12] Porras P, Neumann P. Emerald, (1997). Event monitoring enabling responses to anomalous live disturbances. . In: Proceedings of the 20th national information systems security conference; pp. 353–65 | Khác | |
[13] Li J, Lim D, Sollins K, (2007). Dependency-based distributed intrusion detection. In: Proceedings of the DETER community workshop on cyber security experimentation and test. CA, USA: USENIX Association Berkeley | Khác | |
[15] Balasubramaniyan J, Garcia-Fernandez J, Isacoff D, Spafford E, Zamboni D, (1998). An architecture for intrusion detection using autonomous agents. In:Proceedings of the 14th IEEE computer security applications conference; pp.13–24 | Khác | |
[16] Servin A, Kudenko D, (2008). Multi-agent reinforcement learning for intrusion detection, lecture notes in computer science, vol.4865; pp. 211–23 | Khác | |
[17] Vigna G, (1999). Netstat: a network-based intrusion detection system. Journal of Computer Security;7(1):37–71 | Khác | |
[18] Locasto M, Parekh J, Keromytis A, Stolfo S, (2005). Towards collaborative security and P2P intrusion detection. . In: Proceedings of the 2005 IEEE workshop on information assurance and security; pp. 333–39 | Khác | |
[19] Bloom.BH (1970) Space/time trade-offs in hash coding with allowable errors. Communications of the ACM;13(7):422–6 | Khác | |
[20] Yegneswaran V, Barford P, Jha S.(2004). Global intrusion detection in the DOMINO overlay system. . In: Proceedings of network and distributed security symposium (NDSS) | Khác | |
[22] Garcia J, Autrel F, Borrell J, Castillo S, Cuppens F, Navarro G, (October 2004). Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation. In: Sixth international conference on information and communications security; pp. 223–35 | Khác | |
[23] Dayong Ye MZ, Quan Bai, Ye Z, (May 2008). P2P distributed intrusion detections by using mobile agents. . In: Seventh IEEE/ACIS international conference on computer and information science, 2008 (ICIS 08); pp. 259–65 | Khác | |
[24] Debar H, Wespi A, (2001). Aggregation and correlation of intrusiondetection. In: Proceedings of the 4th international symposium on recent advances in intrusion detection (RAID); pp. 85–103 | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN