References
- IPHIGHWAY, Inc., Introduction to Policy-based Networking and Quality of Service
- B. Moore, E. Ellesson, J. Strassner, and A. Westerinen, Policy Core Information Model Version 1 Spec., IETF RFC3060, Feb. 2001
- D. Schnackenberg, H. Holliday, R. Smith, K. Djahandari, and D. Sterne, Cooperative Intrusion Traceback and Response Architecture(CITRA), DISCEX01, Anaheim,California, June 2001 https://doi.org/10.1109/DISCEX.2001.932192
- S. M. Lewandowski, D. J. Van Hook, G. C. OLeary, J. W. Haines, and L. M. Rossey, SARA:Survivable Autonomic Response Architecture, DISCEX01, Anaheim, California, June 2001 https://doi.org/10.1109/DISCEX.2001.932194
- D. Anderson, T. Frivold, A. Valdes, 'Next-generation Intrusion Detection Expert System(NIDES),' Technical Report SRI-CLS-95-07, May 1995
- R. Heady, G. Luger, A. Maccabe, and M. Servilla, 'The Architecture of a Network Level Intrusion Detection System,' Technical report, University of New Mexico, Department of computer Science, Aug. 1990
- D. Schnackenberg, K. Djahandari, and D. Sterne, Infrastructure for Intrusion Detection and Response, Proceedings of the DARPA Information Survivability Conference and Exposition, SC, Jan. 2000 https://doi.org/10.1109/DISCEX.2000.821505
- W. Lee, W. Fan, 'Mining System Audit Data: Opportunities and Challenges,' College of Computing Georgia Institute of Technology Atlanta, GA 30332-0280, IBM T.J. Watson Research Center Hawthome, NY10532.2000 https://doi.org/10.1145/604264.604270
- W. Lee, S. J. Stolfo, K. W. Mok, 'A Data Mining Framework for Building Intrusion Detection Models,' 2001 https://doi.org/10.1109/SECPRI.1999.766909
- W. Lee, S. J. Stolfo, 'Data Mining Approaches for Intrusion Detection,' Columbia University, Computer Science Department, 1998
- H. Debar and A. Wespi, 'Aggregation and Correlation of Intrusion-Detection Alerts,' In Recent Advances in Intrusion Detection, number 2212 in Lecture Notes in Computer Science, pages 85-103, 2001
- M. S. Shin, H. S. Moon, K. H. Ryu, J. O. Kim and K.Y. Kim, 'Applying Data Mining Techniques to Analyze Alert Data,' APWeb2003, Xi'an,China, Apr. 2003
- A. Valdes and K. Skinner, 'Probabilistic Alert Correlation', Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), pages 54-68, 2001
- S. Staniford, J.A.Hoaglandl, and J.M. McAlerney, 'Practical Automated Detection of Stealthy Portscans,' In ACM Computer and Communications Security IDS Workshop, pages 1-7, 2000
- O. Dain and R.K.Cunningham, 'Fusing a Heterogeneous Alert Stream into Scenarios,' In Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications, pages 113-,Nov. 2001
- E. Lupu and M. Sloman, Conflicts in Policy-based Distributed Systems Management, IEEE Transactions on Software Engineering, Vol. 25, No. 6, Nov. 1999 https://doi.org/10.1109/32.824414
- A. Westerinen, J. Schnizlein, J. Strassner, M. Scherling, B. Quinn, S. Herzog, A. Huynh, M. Carlson, J. Perry, and S. Waldbusser, Terminology for Policy-Based Management, IETF, July 2001
- H. Jiawei and K. Michelle, 'Data Mining: Concepts and Techniques,' Morgan Kaufmann, 2000
- P. Ning and Y. Cui, 'An Intrusion Alert Correlator based on Prerequisites of Intrusions,' Technical Report TR-2002-01, Department of Computer Science, North Carolina State Univ., Jan 2002
- Sudipto Guha, Rajeev Rastogi, and Kyuseok Shim, 'CURE: An Efficient Clustering Algorithm for Large Databases,' In Proceedings of the International Conference on Management of Data(SIGMOD), Vol. 27(2), Seattle,WA,USA, USA, 14, ACM Press, Jun. 1998 https://doi.org/10.1145/276304.276312
- KDD99Cup, ttp://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999
- Lincoln Lab MIT, DARPA 2000 Intrusion Detection Evaluation Datasets, http://ideval.II.mit.edu/2000
- H. S. Moon, M. S. Shin, K. H. Ryu and J. O. Kim 'Implementation of Security Policy Server's Alert Analyzer,' In Proceedings of the International Conference on Computer and Information Science, pages 142-147, Seoul, Korea, Aug. 2002
- M. S. Shin, E. H. Kim, H. S. Moon, K. H. Ryu and K. Y. Kim, 'Data Mining Methods for Alert Correlation Analysis,' Submitted for publication, International Journal of Computer and Information Science, USA, June, 2003
- 김은희, 신문선, 문호성, 류근호, 김기영 '감사데이타 분석 마이너 설계 및 구현', 정보과학회 춘계학술발표, 2002년 4월