NETWORK INTRUSION DETECTION

被引:423
作者
MUKHERJEE, B
HEBERLEIN, LT
LEVITT, KN
机构
来源
IEEE NETWORK | 1994年 / 8卷 / 03期
关键词
D O I
10.1109/65.283931
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:26 / 41
页数:16
相关论文
共 36 条
[1]  
BARTOLETTI T, 1991, 3RD P WORKSH COMP SE
[2]  
Bellovin S. M., 1989, Computer Communication Review, V19, P32, DOI 10.1145/378444.378449
[3]  
BELLOVIN SM, 1992, 3RD P UNIX SEC S BAL
[4]  
BRENTANO J, 1991, THESIS U CALIFORNIA
[5]  
BURR T, 1993, LA12617MS LOS AL NAT
[6]  
CHESWICK WR, 1992, WIN P USENIX C SAN F
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]  
DOAK J, 1992, THESIS U CALIFORNIA
[9]  
Dowell C., 1990, 13th National Computer Security Conference. Proceedings. Information Systems Security. Standards - the Key to the Future, P99
[10]  
Heberlein L. T., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P296, DOI 10.1109/RISP.1990.63859