Cooperative intrusion detection model based on scenario
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[2] Josef Pieprzyk,et al. Case-based reasoning for intrusion detection , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[3] Richard A. Kemmerer,et al. Penetration state transition analysis: A rule-based intrusion detection approach , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[4] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[5] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[6] A HofmeyrSteven,et al. Intrusion detection using sequences of system calls , 1998 .
[7] Li Jia. Correlation Analysis for Distributed Intrusion Alert , 2004 .
[8] Isij Monitor,et al. Network Intrusion Detection: An Analyst’s Handbook , 2000 .
[9] Lian Yi. A Study on Information Exchange and Cooperation in Distributed Intrusion Detection Systems , 2005 .
[10] Zhang Wei. Construction of Intrusion Detection Model for Scenario-based and State Transition Analysis , 2005 .
[11] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.