참고문헌
- James Cannady, Jay Harrell, 'A Comparative Analysis of Current Intrusion Detection Technologies,' 1998. 2
- Mansour Esmaili, Rei Safavi-Naini, 'Case- Based Reasoning for Intrusion Detection, 'Computer Security Applications Conference PP.214-222. 1996
- 이종성, 채수환, '분산 침입 탐지 에이전트를 기반으로 한 지능형 침입탐지시스템 설계,' 한국정보처리학회 논문지 제6권 제5호, 1999년 5월
- Herve Debar, Marc Dacier and Andres Wespi, 'Towards a Taxonomy of Intrusion-Detection Systems', Research Report of IBM Research Division, Zurich Research Laboratory, Jen, 1998
- Taimur Aslam, Invan Krsul and Eugene Spafford, 'Use of A Taxonomy of Security Faults'. In 19th National Information System Security Conference Proceedings, Baltimore, MD, Oct. 1996
- Denning, Dorithy, 'An Intrusion-Detection Model', IEEE Transaction on Software Enginneering, Vol. SE-13, No.2, Feb.1987
- Mansour Esmaili, Rei Safavi-Naini, 'Case-Based Reasoning of Intrusion Detection, 'Computer Security Applications Conference PP.214-222, 1996
- Teresa F. Lunt. 'Detecting intruders in computer systems,' 1993 Conference on Auditing and Computer Technology, 1993
- Karl Levitt, Calvin Ko, and George Fink. 'Automated detection of vulnerabilities in privileged programs by execution monitoring,' 1994 Computer Security Application Conference, 1994
- Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, and Alfonso Valdes. 'Detecting unusual program behavior using the statistical component of the Next-Generation Intrusion Detection Expert System (NIDES)'
- M. Bishop, 'A STANDARD AUDIT TRAIL FORMAT', In Proceedings of the 18th National Information Systems Security Conference, Baltimore, Pages 136-145, 1995
- Herve Debar, Marc Dacier and Andreas Wespi, 'Research Report Towards a Taxonomy of Intrusion Detection Systems', IBM Research Division, Zurich Research Laboratory, June. 1998
- Phillip A. Porras and Peter G. Neumann, EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, SRI International, December 18, 1996
- S. Staniford-Chen, S. Cheung, R.Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle, 'GrIDS-A GRAPH BASED INTRUSION DETECTION SYSTEM FOR LARGE NETWORKS', Department of Computer Science, UC Davis, CA 95616, January 26, 1999
- Deborah Frincke, Don Tobin, Jesse McConnell, Jamie Marconi, Dean Polla, 'A Framework for Cooperative Intrusion Detection, Center for Secure and Dependable Software', Department of Computer Science, University of Idaho, Moscow, ID 83844-1010
- Jai Sunder Balasubramaniyan, Jose Omar Garcia- Fernandez, David Isacoff, Eugene Spafford, Diego Zamboni, 'An Architecture for Intrusion Detection using Autonomous Agents', COAST Laboratory, Purdue University, West Lafayette, IN 47907-1398, June 11, 1998
- Clifford Kahn, Phillip A. Porras, Stuart Staniford-Chen, Brian Tung, 'A Common Intrusion Detection Framework', The Open Group, SRI, UC Davis, ISI, July,1998
- National Computer Security Center, A Guide to Understanding Audit in Trusted Systems, NCSC-TG-001 VERSION-2 Library No. S-228, 470, July, 1987