Cooperative Intrusion Detection Model Based on State Transition Analysis
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[2] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Zhang Wei. Construction of Intrusion Detection Model for Scenario-based and State Transition Analysis , 2005 .
[4] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Giovanni Vigna,et al. The statl attack detection language , 2002 .
[6] Li Jia. Correlation Analysis for Distributed Intrusion Alert , 2004 .
[7] Josef Pieprzyk,et al. Case-based reasoning for intrusion detection , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[8] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[9] Lian Yi. A Study on Information Exchange and Cooperation in Distributed Intrusion Detection Systems , 2005 .
[10] Simson L. Garfinkel,et al. Practical Unix & Internet Security, 3rd Edition , 2003 .
[11] Kishor S. Trivedi,et al. Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.