-
1
-
-
0003914522
-
State of the practice intrusion detection technologies
-
Carnegie Mellon, SEI, Tech Report, CMU/SEI-99-TR-028, ESC-99-028, January
-
J. Allen et al. State of the practice intrusion detection technologies. Carnegie Mellon, SEI, Tech Report, CMU/SEI-99-TR-028, ESC-99-028, January 2000.
-
(2000)
-
-
Allen, J.1
-
3
-
-
0024984013
-
A network security monitor
-
L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A network security monitor. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, April 1990.
-
Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, April 1990
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
4
-
-
0002467033
-
Architecture for an artificial immune system
-
Hofmeyr, S.A., S. Forrest. Architecture for an artificial immune system. Evolutionary Computation, 7(1):45-68, 1999.
-
(1999)
Evolutionary Computation
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
5
-
-
0242444853
-
-
LBNL, University of California, June
-
V. Jacobson, C. Leres, and S. McCanne. tcpdump. LBNL, University of California, June 1997, ftp://ftp.ee.lbl.gov/tcpdump.tar.Z.
-
(1997)
Tcpdump
-
-
Jacobson, V.1
Leres, C.2
McCanne, S.3
-
6
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
Tech. Report, Computer Science Lab., SRI-Int., Menlo Park, CA, March
-
H. S. Javitz, and A. Valdes. The NIDES statistical component: description and justification. Tech. Report, Computer Science Lab., SRI-Int., Menlo Park, CA, March 1994.
-
(1994)
-
-
Javitz, H.S.1
Valdes, A.2
-
9
-
-
0004204715
-
A database of computer attacks for the evaluation of intrusion detection systems
-
Masters Thesis, MIT, June
-
K. Kendell. A database of computer attacks for the evaluation of intrusion detection systems. Masters Thesis, MIT, June 1999
-
(1999)
-
-
Kendell, K.1
-
10
-
-
4243333791
-
Intrusion detection technical evaluation - 1998 project summary
-
R. Lippmann and M. Zissman. Intrusion detection technical evaluation - 1998 project summary. www.darpa.mit/ito.
-
-
-
Lippmann, R.1
Zissman, M.2
-
11
-
-
0002804477
-
Experiences with Emerald to date
-
P. G. Neumann, P. A. Poras. Experiences with Emerald to date. Proceedings of 1st Usenix Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, Apr. 11-12, 1999.
-
Proceedings of 1st Usenix Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, Apr. 11-12, 1999
-
-
Neumann, P.G.1
Poras, P.A.2
-
14
-
-
80051517712
-
Implementing a generalized tool for network monitoring
-
M. J. Ranum, K. Landfield, M. Stolarchuk, M. Sienkiewicz, A. Lambeth, E. Wall. Implementing a generalized tool for network monitoring. Proceedings of 11th Syst. Admin. Conf., San Diego, CA, Oct. 1997.
-
Proceedings of 11th Syst. Admin. Conf., San Diego, CA, Oct. 1997
-
-
Ranum, M.J.1
Landfield, K.2
Stolarchuk, M.3
Sienkiewicz, M.4
Lambeth, A.5
Wall, E.6
-
15
-
-
0012977967
-
Snort - Lightweight intrusions detection for networks
-
M. Roesch. Snort - lightweight intrusions detection for networks. www.clark.net/~roesch/security.html.
-
-
-
Roesch, M.1
-
16
-
-
84874489776
-
Cautionary tales: Stealth coordinated attack howto
-
D. Ruiu. Cautionary tales: stealth coordinated attack howto.www.nswc.navy.mil/ISSEC/CID/Stealth_Coordinated_Attack.html. 1999.
-
(1999)
-
-
Ruiu, D.1
-
20
-
-
0242697270
-
Dids - Motivation, architecture, and an early prototype
-
S. E. Smaha, T. Grance, D. M. Teal and D. Mensur. Dids - motivation, architecture, and an early prototype. Proceedings of 14th National Computer Security Conference, Washington, DC, Oct. 1991.
-
Proceedings of 14th National Computer Security Conference, Washington, DC, Oct. 1991
-
-
Smaha, S.E.1
Grance, T.2
Teal, D.M.3
Mensur, D.4
-
21
-
-
84957039800
-
Principals of a computer immune system
-
A. Somayaji, S.A. Hofmeyr, S. Forrest. Principals of a computer immune system. In 1997 New Security Paradigms Workshop, Langdale, Cumbria, UK.
-
1997 New Security Paradigms Workshop, Langdale, Cumbria, UK
-
-
Somayaji, A.1
Hofmeyr, S.A.2
Forrest, S.3
-
22
-
-
0000949239
-
GrIDS - A graph-based intrusion detection system for large networks
-
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle. GrIDS - a graph-based intrusion detection system for large networks. The 19th National Information Systems Security Conference, Oct. 1998.
-
The 19th National Information Systems Security Conference, Oct. 1998
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
|