Experiences with Specification-Based Intrusion Detection

Author:

Uppuluri Prem,Sekar R.

Publisher

Springer Berlin Heidelberg

Reference8 articles.

1. T. Bowen et al, Building Survivable Systems:An IntegratedApproach Based on Intrusion Detection and Confinement, DISCEX 2000.

2. CERT Coordination Center Advisories 1988-1998, http://www.cert.org/advisories/index.html .

3. Classification of system calls using security based criteria, http://seclab.cs.sunysb.edu/_prem/classifbody.html .

4. Specifications used for 1999 DARPA offline evaluation, http://seclab.cs.sunysb.edu/~prem/specs.html .

5. R. Lippmann, J.W. Haines, D. Fried, J. Korba and K. Das, The 1999 DARPA Off-line evaluation Intrusion Detection Evaluation, Computer Networks, 34, 2000.

Cited by 32 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Cyber-Attack Behavior Detection Model Based on Log Activity Graph;2023 IEEE International Conference on Sensors, Electronics and Computer Engineering (ICSECE);2023-08-18

2. A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions;IEEE Internet of Things Journal;2023-03-01

3. Intrusion Detection and Prevention;Advances in Information Security;2023

4. A Fault and Intrusion Tolerance Framework for Containerized Environments: A Specification-Based Error Detection Approach;2022 International Workshop on Secure and Reliable Microservices and Containers (SRMC);2022-09

5. Network intrusion detection system: A survey on artificial intelligence‐based techniques;Expert Systems;2022-07-19

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3