Литература

[1] Cyber attacks rise from outside and inside corporations. -- Computer Security Institute , 1999

[2] Global Security Survey: Virus Attack. -- InformationWeek , 12 июля 1999

[3] National Infrastructure Protection Center CyberNotes -- NIPC , #15-99 , 1999

[4] Владимир Галатенко -- Современная трактовка сервисов безопасности. -- Jet Info , 5 , 1999

[5] Information Security: Computer Attacks at Department of Defense Pose Increasing Risks. -- General Accounting Office, Chapter Report , GAO/AIMD-96-84 , 05/22/96

[6] Максим Столяров , Илья Трифаленков -- На пути к управляемым информационным системам. -- Jet Info , 3 , 1999

[7] R. Power -- CSI Roundtable: Experts discuss present and future intrusion detection systems. -- Computer Security Journal , Vol. XIV, #1.

[8] D. Denning -- An Intrusion-Detection Model. -- IEEE Transactions on Software Engineering , SE-13, No. 2, pp. 222-232. , February 1987

[9] R. Bace -- An Introduction to Intrusion Detection Assessment. -- ICSA , 1999

[10] T. Bass -- Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness. -- Communicaions of the ACM, accepted for publication (draft).

[11] T. Goan -- A Cop on the Beat: Collecting and Appraising Intrusion Evidence. -- Communicaions of the ACM. , Vol. 42, No. 7, pp. 46-52. , July 1999

[12] M. Stillerman , C. Marceau , M. Stillman -- Intrusion Detection for Distributed Applications. -- Communicaions of the ACM. , Vol. 42, No. 7, pp. 62-69. , July 1999

[13] A. Ghosh , J. Voas -- Inoculating Software for Survivability. -- Communicaions of the ACM. , Vol. 42, No. 7, pp. 38-44. , July 1999

[14] Д. Кэри -- Дредноут (пер с англ.). -- Смоленск: Русич , 1996

[15] U. Lindqvist , P. Porras -- Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). -- Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California. , May 9-12, 1999

[16] R. Graham -- FAQ: Network Intrusion Detection Systems. - Version 0.5.2. -- Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California. , July 17, 1999

[17] Aлексей. Галатенко -- О применении методов теории вероятностей для решения задач информационной безопасности. -- М.: НИИСИ РАН , 1999

[18] P. Porras , A. Valdes -- Live Traffic Analysis of TCP/IP Gateways. -- Proceedings of the 1998 ISOC Symposium on Network and Distributed Systems Security. , July 17, 1999

[19] U.S. Drawing Plan That Will Monitor Computer Systems. -- New York Times , 28 июля 1999

[20] M. Wood -- Inrusion Detection Exchange Format Requirements. -- Internet-Draft. , June 1999

[21] C. Kahn , P. Porras , S. Staniford-Chen , B. Tung -- A Common Intrusion Detection Framework. -- Draft submission to a nice publication. , July 1998

[22] M. Crosbie , K. Price -- Intrusion Detection Systems. -- Purdue University, COAST Laboratory.

[23] P. Neumann , P. Porras -- Experience with EMERALD to Date. -- Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring. Santa Clara, California. , 11-12 April 1999

[24] M. Ranum , K. Landfield , M. Stolarchuk , M. Sienkiewicz , A. Lambeth , E. Wall -- Implementing A Generalized Tool For Network Monitoring. -- Proceedings of the 11th Systems Administration Conference (LISA '97), San Diego, California. , October 26-31, 1997

[25] NFR Intrusion Detection Appliance. Version 3.0. Monitor, Examine, Uncover, Empower. -- Network Flight Recorder Inc. , 1999

[26] R. Durst , T. Champion , B. Witten , E. Miller , L. Spagnulol -- Testing and Evaluating Computer Intrusion Detection Systems. -- Communicaions of the ACM. , Vol. 42, No. 7, pp. 53-61. , July 1999


Заключение Содержание Возможные критерии оценки систем активного аудита
Copyright ╘ 1993-2000, Jet Infosystems