A new intrusion detection method based on process profiling
暂无分享,去创建一个
Shigeki Goto | Izuru Sato | Yoshinori Okazaki | S. Goto | Yoshinori Okazaki | I. Sato | Shigeki Goto
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[2] Simson L. Garfinkel,et al. Practical UNIX Security , 1991 .
[3] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[4] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[5] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[7] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] Elizabeth D. Zwicky,et al. Building Internet firewalls (2nd ed.) , 2000 .
[9] Shigeki Goto,et al. A new intrusion detection method based on discriminant analysis , 2001 .
[10] Mike Kosta Loukides. System Performance Tuning , 1990 .