-
1
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
January
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, E. Stoner, State of the practice of intrusion detection technologies, Carnegie Mellon University/Software Engineering Institute Technical Report CMU/SEI-99-TR-028, January 2000.
-
(2000)
Carnegie Mellon University/Software Engineering Institute Technical Report CMU/SEI-99-TR-028
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
2
-
-
0003482133
-
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response
-
E.G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, 1999.
-
(1999)
Intrusion.Net Books
-
-
Amoroso, E.G.1
-
4
-
-
2542563730
-
An experimental workbench for intrusion detection systems
-
IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, 9 March
-
H. Debar, M. Dacier, A. Wespi, S. Lampart, An experimental workbench for intrusion detection systems, Research Report RZ 2998 (#93044), IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, 9 March 1999, http://www.zurich.ibm.com/Technology/Security/extern/gsal/docs/index.html.
-
(1999)
Research Report RZ 2998 (#93044)
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
5
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Testing and evaluating computer intrusion detection systems. Communications of the ACM. 42:1999;53-61.
-
(1999)
Communications of the ACM
, vol.42
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
7
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
23-26 August Washington, DC
-
A.K. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, in: Proceedings of the USENIX Security Symposium, 23-26 August 1999, Washington, DC, http://www.rstcorp.com/simanup/.
-
(1999)
Proceedings of the USENIX Security Symposium
-
-
Ghosh, A.K.1
Schwartzbard, A.2
-
8
-
-
0343908110
-
-
project described in April
-
S. Jajodia, D. Barbara, B. Speegle, N. Wu, Audit Data Analysis and Mining (ADAM), project described in http://www.isse.gmu.edu/simdbarbara/adam.html, April 2000.
-
(2000)
Audit Data Analysis and Mining (ADAM)
-
-
Jajodia, S.1
Barbara, D.2
Speegle, B.3
Wu, N.4
-
11
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
IEEE Press, New York, January
-
R.P. Lippmann, David J. Fried, Isaac Graf, Joshua W. Haines, Kristopher R. Kendall, David McClung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunningham, Marc A. Zissman, Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation, in: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), vol. 2, IEEE Press, New York, January 2000.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX)
, vol.2
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
13
-
-
85095970245
-
Experience with EMERALD to DATE
-
Santa Clara, CA, April
-
P. Neumann, P. Porras, Experience with EMERALD to DATE, in: Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999, pp. 73-80, http://www.sdl.sri.com/emerald/index.html.
-
(1999)
Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.1
Porras, P.2
-
15
-
-
0004145058
-
-
Secure Networks, Inc. Report, January
-
T.H. Ptacek, T.N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc. Report, January 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
16
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza N., Zhang K., Chung M., Mukherjee B., Olsson R.A. A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering. 22:1996;719-729.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
17
-
-
3643079262
-
A software platform for testing intrusion detection systems
-
N. Puketza, M. Chung, R.A. Olsson, B. Mukherjee, A software platform for testing intrusion detection systems, IEEE Software (September/October 1997) 43-51.
-
(1997)
IEEE Software
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.A.3
Mukherjee, B.4
-
18
-
-
0343908106
-
A study in the feasibility of performing host-based anomaly detection on Windows NT
-
West Lafayette, IN, 7-9 September
-
A. Schwartzbard, A.K. Ghosh, A study in the feasibility of performing host-based anomaly detection on Windows NT, in: Proceedings of the Second Recent Advances in Intrusion Detection (RAID 1999) Workshop, West Lafayette, IN, 7-9 September 1999.
-
(1999)
Proceedings of the Second Recent Advances in Intrusion Detection (RAID 1999) Workshop
-
-
Schwartzbard, A.1
Ghosh, A.K.2
-
19
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
Washington, DC, August
-
R. Sekar, P. Uppuluri, Synthesizing fast intrusion prevention/detection systems from high-level specifications, in: Proceedings of the Eighth Usenix Security Symposium, Washington, DC, August 1999, http://rcs-sgi.cs.iastate.edu/sekar/abs/usenixsec99.htm.
-
(1999)
Proceedings of the Eighth Usenix Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
20
-
-
0343472303
-
Intrusion detection, take two
-
15 November
-
G. Shipley, Intrusion detection, take two, Network Computing, 15 November 1999, http://www.nwc.com/1023/10231.html.
-
(1999)
Network Computing
-
-
Shipley, G.1
-
22
-
-
33646828569
-
-
project described in April
-
M. Tyson, P. Berry, N. Williams, D. Moran, D. Blei, DERBI: Diagnosis, Explanation and Recovery from Computer Break-Ins, project described in http://www.ai.sri.com/simderbi/, April 2000.
-
(2000)
DERBI: Diagnosis, Explanation and Recovery from Computer Break-Ins
-
-
Tyson, M.1
Berry, P.2
Williams, N.3
Moran, D.4
Blei, D.5
-
23
-
-
84860434876
-
The STAT tool suite
-
IEEE Press, New York, January
-
G. Vigna, S.T. Eckmann, R.A. Kemmerer, The STAT tool suite, in: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), IEEE Press, New York, January 2000.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX)
-
-
Vigna, G.1
Eckmann, S.T.2
Kemmerer, R.A.3
-
24
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna, R. Kemmerer, NetSTAT: A network-based intrusion detection system, Journal of Computer Security 7(1) (1999).
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Vigna, G.1
Kemmerer, R.2
|