Digital Library


Search: "[ keyword: Intrusion Detection ]" (33)
    Alert Correlation Analysis based on Clustering Technique for IDS
    Sin Mun Seon , Mun Ho Seong , Lyu Geun Ho , Jang Jong Su The KIPS Transactions:PartC, Vol. 10, No. 6, pp. 665-674, Oct. 2003
    10.3745/KIPSTC.2003.10.6.665


    Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems
    Yu Il Seon , Lee Dong Lyeon , O Eun Sug The KIPS Transactions:PartC, Vol. 10, No. 5, pp. 565-574, Oct. 2003
    10.3745/KIPSTC.2003.10.5.565


    A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agent
    Kim Tae Gyeong , Lee Dong Yeong , Jeong Tae Myeong The KIPS Transactions:PartC, Vol. 10, No. 5, pp. 525-532, Oct. 2003
    10.3745/KIPSTC.2003.10.5.525


    Generation of Finite Automata for Intrusion Detection
    Young Hwan Lim , Kyu Bum Wee The KIPS Transactions:PartC, Vol. 10, No. 2, pp. 119-124, Apr. 2003
    10.3745/KIPSTC.2003.10.2.119


    A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks
    Il Sun You , Jong Eun Kim , Kyung San Cho The KIPS Transactions:PartC, Vol. 10, No. 1, pp. 1-10, Feb. 2003
    10.3745/KIPSTC.2003.10.1.1


    Anomaly Intrusion Detection based on Association Rule Mining in a Database System
    Jeong Ho Park , Sang Hyun Oh , Won Suk Lee The KIPS Transactions:PartC, Vol. 9, No. 6, pp. 831-840, Dec. 2002
    10.3745/KIPSTC.2002.9.6.831


    An Improved Detection System for the Network Vulnerability Scan Attacks
    Il Sun You, Kyung San Cho The KIPS Transactions:PartC, Vol. 8, No. 5, pp. 543-550, Oct. 2001
    10.3745/KIPSTC.2001.8.5.543


    Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks
    Mi Hui Kim , Ji Sun Kim , Ki Joon Chae The KIPS Transactions:PartC, Vol. 16, No. 2, pp. 151-164, Apr. 2009
    10.3745/KIPSTC.2009.16.2.151


    Traffic Flooding Attack Detection on SNMP MIB Using SVM
    Jae Hak Yu , Jun Sang Park , Han Sung Lee , Myung Sup Kim , Dai Hee Park The KIPS Transactions:PartC, Vol. 15, No. 5, pp. 351-358, Oct. 2008
    10.3745/KIPSTC.2008.15.5.351


    An Intrusion Detection Method by Tracing Root Privileged Processes
    Jang Su Park , Byoung Chul Ahn The KIPS Transactions:PartC, Vol. 15, No. 4, pp. 239-244, Aug. 2008
    10.3745/KIPSTC.2008.15.4.239