2003
DOI: 10.1016/s0167-4048(03)00406-1
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy for information security technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0
2

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(41 citation statements)
references
References 6 publications
0
34
0
2
Order By: Relevance
“…For this, we can use security testing papers [84][85][86][87][88][89][90][91], some of which concentrate specifically on data and applications [92]or the design stage [93,94]. Additionally, there are papers that measure FDD quality and attempt to use those techniques, or combine them, to measure the security quality [95] in the FDD process.…”
Section: Q4: How Are We Going To Measure Security and Fddmentioning
confidence: 99%
“…For this, we can use security testing papers [84][85][86][87][88][89][90][91], some of which concentrate specifically on data and applications [92]or the design stage [93,94]. Additionally, there are papers that measure FDD quality and attempt to use those techniques, or combine them, to measure the security quality [95] in the FDD process.…”
Section: Q4: How Are We Going To Measure Security and Fddmentioning
confidence: 99%
“…Furthermore, the situation trigger of alarm (valid or invalid but feasible) from sensor to event response. Previous work performed by Xinyau in 2004 [35], introduce the attempt to develop intrusion sensor with SNMP based. Unfortunately, SNMP based have problem that vulnerability MIB and agent.…”
Section: )mentioning
confidence: 99%
“…To detect suspicious threat, there are two approach [3], [35], [36], and [37]: (i) Host-based approach : Host-based are currently popular technologies, it is check for suspicious activity from the host or operating system level, the monitoring location use the agent component, which is useful before the host it reaches target of attack. The alarm triggered and provide intrusive this activity, and (ii) Network-based approach, the sniff and identify packet all inbound-outbound in out of the network.…”
Section: Detection Analysismentioning
confidence: 99%
“…Still a relatively young field, first discussed by James Anderson in his seminal 1980 paper (Anderson, 1980) and with the first working system described in Dorothy Denning's 1987 paper (Denning, 1987), intrusion detection still faces many unresolved research issues. Many intrusion detection systems have been developed, representative samples of which are reviewed in Kemmerer and Vigna (2002) and Venter and Eloff (2003). Several excellent review papers (Axelsson, 2000, Bace andMell, 2001) and books (Northcutt and Novak, 2003) on intrusion detection approaches have also been published.…”
Section: Biologically-inspired Approachesmentioning
confidence: 99%