References
- E. H. Spafford, Security Seminar, Department of Computer Science, Purdue University, January 1996
- 한국정보보호센터, 호스트기반 침입탐지시스템 개발에 관한 연구, 1998년 12월
- S. Kumar and E. H. Spafford, 'An application of pattern matching in intrusion detection,' Technical Report CSD-TR-94-013, 1994
- T. F. Lunt, 'A survey of intrusion detection techniques,' Computer & Security, vol. 12, no. 4, June 1993 https://doi.org/10.1016/0167-4048(93)90029-5
- T. Lane and C. E. Brodley, 'Temporal sequence learning and data reduction for anomaly detection,' ACM Trans. on Information and System Security, vol. 2, no. 3, pp. 295-331, August 1999 https://doi.org/10.1145/322510.322526
- A. K. Ghosh, A. Schwartz bard and M. Schatz, 'Learning program behavior profiles for intrusion detection,' Proc. Workshop on Intrusion Detection and Network Monitoring, Santa Clara, USA, April 1999
- C. Warrender, S. Forrest and B. Pearlmutter, 'Detecting intrusions using system calls:Alternative data models,' Proc. IEEE Symposium on Security and Privacy, May 1999 https://doi.org/10.1109/SECPRI.1999.766910
- H. Deba, M. Dacier and A. Wespi, 'Towards a taxonomy of intrusion-detection systems,' Computer Networks, vol. 31, pp. 805-822, 1999 https://doi.org/10.1016/S1389-1286(98)00017-6
- P. Porras and R. Kemmerer, 'Penetration state transition analysis - A rule-based intrusion detection approach,' Proc. 8th Annual Computer Security Applications Conf., pp. 220-229, November 1992
- P. Helman and G. Liepins, 'Statistical foundations of audit trail analysis for the detection of computer misuse,' IEEE Trans. on Software Engineering, vol. 19, no. 9, pp. 886~901, September 1993 https://doi.org/10.1109/32.241771
- P. Helman, G. Liepins and W. Richards, 'Foundations of intrusion detection,' Proc. Fifth Computer Security Foundations Workshop, pp. 114-120, Franconic, USA, June 1992 https://doi.org/10.1109/CSFW.1992.236783
- H. Iavitz et aI., 'Next generation intrusion detection expert system (NIDES) - 1. statistical algorithms rationale - 2. rationale for proposed resolver,' Technical Report A016-Rationales, SRI International, March 1993
- H. Vaccaro and G. Liepins, 'Detection of anomalous computer session activity,' Proc. 1989 IEEE Symposium on Research in Security and Privacy, pp. 280~289, 1989 https://doi.org/10.1109/SECPRI.1989.36302
- T. Spyrou and J. Darzentas, 'Intention modelling: Approximating computer user intentions for detection and prediction of intrusions,' Information Systems Security, pp. 39-335, Chapman & Hall, May 1996
- S. Forrest, S. A. Hofmeyr and A. Somayaji, 'Computer immunology,' CACM, vol. 40, no. 10, pp. 88-96, October 1997 https://doi.org/10.1145/262793.262811
- S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, 'A Sense of Self for Unix Processes,' Proc. IEEE Symposium on Computer Security and Privacy, pp. 120-128, Los Alamos, USA, 1996 https://doi.org/10.1109/SECPRI.1996.502675
- Sunsoft, Solaris 2.5 Sunshield Basic Security Module Guide, 1995
- L. R. Rabiner, 'A tutorial on hidden Markov models and selected applications in speech recognition,' Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, February 1989 https://doi.org/10.1109/5.18626
- T. Dunigan and G. Hinkel, 'Intrusion detection and intrusion prevention on a large network: A case study,' Proc. Workshop on Intrusion Detection and Network Monitoring, Santa Clara, USA, April 1999