Digital Library
Search: "[ keyword: Intrusion Detection ]" (33)
Alert Correlation Analysis based on Clustering Technique for IDS
Sin Mun Seon , Mun Ho Seong , Lyu Geun Ho , Jang Jong Su The KIPS Transactions:PartC,
Vol. 10, No. 6, pp. 665-674,
Oct.
2003
10.3745/KIPSTC.2003.10.6.665
10.3745/KIPSTC.2003.10.6.665
Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems
Yu Il Seon , Lee Dong Lyeon , O Eun Sug The KIPS Transactions:PartC,
Vol. 10, No. 5, pp. 565-574,
Oct.
2003
10.3745/KIPSTC.2003.10.5.565
10.3745/KIPSTC.2003.10.5.565
A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agent
Kim Tae Gyeong , Lee Dong Yeong , Jeong Tae Myeong The KIPS Transactions:PartC,
Vol. 10, No. 5, pp. 525-532,
Oct.
2003
10.3745/KIPSTC.2003.10.5.525
10.3745/KIPSTC.2003.10.5.525
Generation of Finite Automata for Intrusion Detection
Young Hwan Lim , Kyu Bum Wee The KIPS Transactions:PartC,
Vol. 10, No. 2, pp. 119-124,
Apr.
2003
10.3745/KIPSTC.2003.10.2.119
10.3745/KIPSTC.2003.10.2.119
A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks
Il Sun You , Jong Eun Kim , Kyung San Cho The KIPS Transactions:PartC,
Vol. 10, No. 1, pp. 1-10,
Feb.
2003
10.3745/KIPSTC.2003.10.1.1
10.3745/KIPSTC.2003.10.1.1
Anomaly Intrusion Detection based on Association Rule Mining in a Database System
Jeong Ho Park , Sang Hyun Oh , Won Suk Lee The KIPS Transactions:PartC,
Vol. 9, No. 6, pp. 831-840,
Dec.
2002
10.3745/KIPSTC.2002.9.6.831
10.3745/KIPSTC.2002.9.6.831
An Improved Detection System for the Network Vulnerability Scan Attacks
Il Sun You, Kyung San Cho The KIPS Transactions:PartC,
Vol. 8, No. 5, pp. 543-550,
Oct.
2001
10.3745/KIPSTC.2001.8.5.543
10.3745/KIPSTC.2001.8.5.543
Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks
Mi Hui Kim , Ji Sun Kim , Ki Joon Chae The KIPS Transactions:PartC,
Vol. 16, No. 2, pp. 151-164,
Apr.
2009
10.3745/KIPSTC.2009.16.2.151
10.3745/KIPSTC.2009.16.2.151
Traffic Flooding Attack Detection on SNMP MIB Using SVM
Jae Hak Yu , Jun Sang Park , Han Sung Lee , Myung Sup Kim , Dai Hee Park The KIPS Transactions:PartC,
Vol. 15, No. 5, pp. 351-358,
Oct.
2008
10.3745/KIPSTC.2008.15.5.351
10.3745/KIPSTC.2008.15.5.351
An Intrusion Detection Method by Tracing Root Privileged Processes
Jang Su Park , Byoung Chul Ahn The KIPS Transactions:PartC,
Vol. 15, No. 4, pp. 239-244,
Aug.
2008
10.3745/KIPSTC.2008.15.4.239
10.3745/KIPSTC.2008.15.4.239