-
2
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Technical Report CMU/SEI-99-TR-028, Carnegie Mellon University - Software Engineering Institute, January
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99-TR-028, Carnegie Mellon University - Software Engineering Institute, January 2000.
-
(2000)
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
3
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Technical report, James P. Anderson Co.; Contract No. 79F26400
-
J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., 1980. Contract No. 79F26400.
-
(1980)
-
-
Anderson, J.P.1
-
5
-
-
0003524305
-
A preliminary attempt to apply detection and estimation theory to intrusion detection
-
Technical Report 00-4, Department of Computer Engineering - Chalmers University of Technology, Sweden, March
-
S. Axelsson. A Preliminary Attempt to Apply Detection and Estimation Theory to Intrusion Detection. Technical Report 00-4, Department of Computer Engineering - Chalmers University of Technology, Sweden, March 2000.
-
(2000)
-
-
Axelsson, S.1
-
6
-
-
0003516333
-
Intrusion detection systems: A taxonomy and survey
-
Technical Report 99-15, Department of Computer Engineering - Chalmers University of Technology, Sweden, March
-
S. Axelsson. Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99-15, Department of Computer Engineering - Chalmers University of Technology, Sweden, March 2000.
-
(2000)
-
-
Axelsson, S.1
-
7
-
-
0036993361
-
Optimization and control problems in real time intrusion detection
-
J. B. D. Cabrera, W. Lee, R. K. Prasanth, L. Lewis, and R. K. Mehra. Optimization and Control Problems in Real Time Intrusion Detection. In Proceedings of the 41st IEEE Conference on Decision and Control, Las Vegas, NV, December 2002.
-
Proceedings of the 41st IEEE Conference on Decision and Control, Las Vegas, NV, December 2002
-
-
Cabrera, J.B.D.1
Lee, W.2
Prasanth, R.K.3
Lewis, L.4
Mehra, R.K.5
-
9
-
-
0013264090
-
Proactive intrusion detection and distributed denial of service attacks - A case study in security management
-
June
-
J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, and R. K. Mehra. Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. Journal of Network and Systems Management, 10(2):225-254, June 2002.
-
(2002)
Journal of Network and Systems Management
, vol.10
, Issue.2
, pp. 225-254
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Mehra, R.K.5
-
10
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables - A feasibility study
-
Seattle, WA, May
-
J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, R. K. Prasanth, B. Ravichandran, and R. K. Mehra. Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables - A Feasibility Study. In Proceedings of the Seventh IFIP/IEEE International Symposium on Integrated Network Management, pages 609-622, Seattle, WA, May 2001.
-
(2001)
Proceedings of the Seventh IFIP/IEEE International Symposium on Integrated Network Management
, pp. 609-622
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Prasanth, R.K.5
Ravichandran, B.6
Mehra, R.K.7
-
11
-
-
0033712953
-
Statistical traffic modeling for network intrusion detection
-
San Francisco, CA, August; IEEE Computer Society
-
J. D. B. Cabrera, B. Ravichandran, and R. K. Mehra. Statistical Traffic Modeling for Network Intrusion Detection. In Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, pages 466-473, San Francisco, CA, August 2000. IEEE Computer Society.
-
(2000)
Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 466-473
-
-
Cabrera, J.D.B.1
Ravichandran, B.2
Mehra, R.K.3
-
13
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi. Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks, 31:805-822, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
19
-
-
0004204715
-
A database of computer attacks for the evaluation of intrusion detection systems
-
Master's thesis, Massachusetts Institute of Technology, June
-
K. Kendall. A database of computer attacks for the evaluation of intrusion detection systems. Master's thesis, Massachusetts Institute of Technology, June 1999.
-
(1999)
-
-
Kendall, K.1
-
20
-
-
0034588633
-
On the trail of intrusions into information systems
-
December
-
S. Kent. On the trail of intrusions into information systems. IEEE Spectrum, pages 52-56, December 2000.
-
(2000)
IEEE Spectrum
, pp. 52-56
-
-
Kent, S.1
-
22
-
-
33745651405
-
Performance adaptation in real-time intrusion detection systems
-
W. Lee, J. B. D. Cabrera, A. Thomas, N. Balwalli, S. Saluja, and Y. Zhang. Performance Adaptation in Real-Time Intrusion Detection Systems. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, October 2002.
-
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, October 2002
-
-
Lee, W.1
Cabrera, J.B.D.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
23
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
In Press
-
W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok. Toward Cost-Sensitive Modeling for Intrusion Detection and Response. Journal of Computer Security, 2002. In Press.
-
(2002)
Journal of Computer Security
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
24
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
November
-
W. Lee and S. J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and Systems, 3(4), November 2000.
-
(2000)
ACM Transactions on Information and Systems
, vol.3
, Issue.4
-
-
Lee, W.1
Stolfo, S.J.2
-
27
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R. P. Lippman, D. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, volume 2, 2000.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, vol.2
-
-
Lippman, R.P.1
Fried, D.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
-
28
-
-
0036465274
-
Internet congestion control
-
February
-
S. H. Low, F. Paganini, and J. C. Doyle. Internet Congestion Control. IEEE Control Systems Magazine, 22(1):28-43, February 2002.
-
(2002)
IEEE Control Systems Magazine
, vol.22
, Issue.1
, pp. 28-43
-
-
Low, S.H.1
Paganini, F.2
Doyle, J.C.3
-
31
-
-
0013250281
-
Integrating data mining techniques with intrusion detection
-
In V. Atluri and J. Hale, editors; Kluwer Publishers
-
R. K. Mukkamala, J. Gagnon, and S. Jajodia. Integrating Data Mining Techniques with Intrusion Detection. In V. Atluri and J. Hale, editors, Research Advances in Database and Information Systems Security, pages 33-46. Kluwer Publishers, 2000.
-
(2000)
Research Advances in Database and Information Systems Security
, pp. 33-46
-
-
Mukkamala, R.K.1
Gagnon, J.2
Jajodia, S.3
-
33
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31:2435-2463, December 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
34
-
-
0004060388
-
-
MIT Press, Cambridge, MA
-
J. Pratt, H. Raiffa, and R. Schlaifer. Introduction to Statistical Decision Theory. MIT Press, Cambridge, MA, 1995.
-
(1995)
Introduction to Statistical Decision Theory
-
-
Pratt, J.1
Raiffa, H.2
Schlaifer, R.3
-
35
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
October
-
N.J. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. O. Olsson. A Methodology for Testing Intrusion Detection Systems. IEEE Transactions on Software Engineering, October 1996.
-
(1996)
IEEE Transactions on Software Engineering
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.O.5
-
37
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
38
-
-
84962267363
-
Infrastructure for intrusion detection and response
-
D. Schnakenberg, K. Djahandari, and D. Sterne. Infrastructure for intrusion detection and response. In Proceedings of DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC, January 2000.
-
Proceedings of DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC, January 2000
-
-
Schnakenberg, D.1
Djahandari, K.2
Sterne, D.3
-
39
-
-
0003714340
-
-
F. B. Schneider, editor; National Academy Press
-
F. B. Schneider, editor. Trust in Cyberspace. National Academy Press, 1998.
-
(1998)
Trust in Cyberspace
-
-
-
40
-
-
2942751146
-
Experiences with specification-based intrusion detection
-
Springer-Verlag, Lecture Notes in Computer Science, Number 2212
-
P. Uppuluri and R. Sekar. Experiences with Specification-based Intrusion Detection. In Recent Advances in Intrusion Detection (RAID 2001). Springer-Verlag, Lecture Notes in Computer Science, Number 2212, 2001.
-
(2001)
Recent Advances in Intrusion Detection (RAID 2001)
-
-
Uppuluri, P.1
Sekar, R.2
|