Помощь в учёбе, очень быстро...
Работаем вместе до победы

Литература. 
Способы обнаружения компьютерных атак

РефератПомощь в написанииУзнать стоимостьмоей работы

N. Habra, B. Le Charlier, A. Mounji, Advanced Security Audit Trail Analysis on uniX. Implementation Design of the NADF Evaluator. Research Report, Computer Science Institute, University of Namur, Belgium, March 1993. N. Habra, B. Le Charlier, A. Mounji & I. Mathieu, «Preliminary Report on Advanced Security Audit Trail Analysis on UniX», Research Report 1/92, Institut d’Informatique, University… Читать ещё >

Литература. Способы обнаружения компьютерных атак (реферат, курсовая, диплом, контрольная)

1. A. Mounji, Languages and Tools for Rule-Based Distributed Intrusion Detection, PhD Thesis, Computer Science Institute, University of Namur, Belgium, Sept 1997.

2. Amoroso, Edward, G., Intrusion Detection, 1st ed., Intrusion.Net Books, Sparta, New Jersey, USA, 1999.

3. Jai Balasubramaniyan, Jose Omar Garcia-Fernandez, E. H. Spafford, Diego Zamboni, An Architecture for Intrusion Detection using Autonomous Agents, Department of Computer Sciences, Purdue University; Coast TR 98−05; 1998.

4. A. Baur & W. Weiss, «Audit Analysis Tool for Systems with High Demands Regarding Security and Access Control», Research Report, ZFE F2 SOF 42, Siemens Nixdorf Software, Mьnchen, November 1988.

5. M. Crosbie, E. Spafford, Defending a computer system using autonomous agents, Technical Report 95−022, COAST Laboratory, Department of Computer Sciences, Purdue University, West Lafayette, IN 47 907−1398, March 1994.

6. M. Crosbie, E. Spafford, Defending a computer system using autonomous agents, in: Proceedings of the 18th National Information Systems Security Conference, October 1995.

7. S.T. Eckmann, G. Vigna, and R.A. Kemmerer, «STATL: An Attack Language for State-based Intrusion Detection,» in Proceedings of the ACM Workshop on Intrusion Detection, Athens, Greece, 2000.

8. N. Habra, B. Le Charlier, A. Mounji & I. Mathieu, «Preliminary Report on Advanced Security Audit Trail Analysis on UniX», Research Report 1/92, Institut d’Informatique, University of Namur, January 1992.

9. N. Habra, B. Le Charlier, A. Mounji, Advanced Security Audit Trail Analysis on uniX. Implementation Design of the NADF Evaluator. Research Report, Computer Science Institute, University of Namur, Belgium, March 1993.

10. S. Kumar, Classification and detection of computer intrusions, Ph.D. Thesis, Purdue University, West Lafayette, IN 47 907, 1995.

11. Kumar, S. & Spafford, E. (1995) A Software Architecture to Support Misuse Intrusion Detection. Department of Computer Sciences, Purdue University; CSD-TR-95−009.

12. A. Mounji, B. Le Charlier, D. Zampuniйris, N. Habra, Preliminary Report on Distributed ASAX. Research Report, Computer Science Institute, University of Namur, Belgium, May 1994.

13. Porras, P. A., Ilgun, K., and Kemmerer, R. A. (1995). State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, SE-21: 181−199.

14. Ralph, William D., SHADOW version 1.7 Installation manual, 2001, http://www.nswc.navy.mil/ISSEC/CID/Install.pdf.

15. Roesch, Martin, Snort Users Manual, Snort Release: 1.8.1, 2001, http://www.snort.org/.

16. Eugene H. Spafford, Diego Zamboni, Intrusion detection using autonomous agents, Computer Networks, 34(4):547−570, October 2000.

17. G. Vigna, R. Kemmerer, «NetSTAT: A Network-based Intrusion Detection Approach,» in Proceedings of the 14th Annual Computer Security Application Conference, Scottsdale, Arizona, December 1998.

18. G. Vigna, R.A. Kemmerer, «NetSTAT: A Network-based Intrusion Detection System,» Journal of Computer Security, 7(1), IOS Press, 1999.

19. Diego Zamboni, E. H. Spafford, AAFID2 Users Guide. Department of Computer Sciences; 1998.

20. Yoann Vandoorselaere, Laurent Oudot, «Prelude, an Hybrid Open Source Intrusion Detection System», http://www.prelude-ids.org/, 2002.

Показать весь текст
Заполнить форму текущей работой