Intrusion Detection and Prevention Technology using Sensor Networks to Protect Firewall from Attacks
Abstract
Keywords
Full Text:
PDFReferences
William R. Cheswick and Steven M. Bellovin, "Firewalls and Internet Security," Addison-Wesley, 1994.
Vern Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Seventh USENIX Security Symposium Proceedings, pp. 31-51, January 1998.
"Network Intrusion Detector," Lawrence Livermore National Laboratory (UCRL-MA-116609 rev.3), November 1997.
Internet Security Systems, Inc., "Internet Security Scanner" and "RealSecure," 1998.
Shadow, SANS Institute, 1998.
Computer Incident Advisory Capability (CIAC), CIAC Bulletins, 1998.
Computer Emergency Response Team (CERT) Coordination Center, CERT Advisories,1998.
Rootshell, Exploit Information and Hacker Tools, 1998.
BUGTRAQ, Bugtraq mailing list archives, 1998.
Computer Operations, Audit, and Security Technology (COAST), 1998.
J.P. Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P Anderson Co., Fort Washington, Pennsylvania, April 1980.
J MJ. McHugh, A. Christie, J. Allen, “Defending Yourself: The Role of Intrusion Detection Systems,” In IEEE Software September/October 2000 Focus Malicious IT.
SANS Institute Info Sec Reading Room” Understanding Intrusion detection systems”
E. Amoroso and R. Kwapniewski, “A Selection Criteria for Intrusion Detection Systems,” Proc. 14th Ann. Computer Security Applications Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1998.
Andreas Fuchsberger, ”Intrusion Detection Systems and Intrusion Prevention Systems “Information Security Technical Report Elsevier (2005).
OSSEC (Observing System Science Executive Council) OSS. Homepage of ossec, 2011. http://www.ossec.net/. Online; accessed.
Peter Scarf one, Karen; Mell. Guide to intrusion detection and prevention systems (idps). Computer Security Resource Center (National Institute of Standards and Technology), January 2010.
Joseph Migga Kizza. Computer Network Security.
Vermanitin.; Mattord. Principles of Information Security. Course Technology.
Peter Scarf one, Karen; Mell. Guide to intrusion detection and prevention systems (idps).Computer Security Resource Center (National Institute of Standards and Technology), January 2010.
Robert C. Newman. Computer Security: Protecting Digital Resources. Jones and Bartlett Learning. 2009.
Michael E. Whitman; Herbert J. Mattord. Principles of Information Security. Engage Learning EMEA, 2009.
Tim Boyles. CCNA Security Study Guide: Exam 640-553. John Wiley and Sons, 2010.
Harold F. Tipton; Micki Krause. Information Security Management Handbook.CRC Press, 2007.
John R. Vacca. Managing Information Security. Syngress, 2010.
DOI: http://dx.doi.org/10.36039/AA122013002
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.