-
1
-
-
0037986866
-
Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES)
-
Computer Science Laboratory SRI-CSL 95-06 May
-
Anderson, Debra, Teresa F. Lunt, Harold Javitz, Ann Tamaru, Alfonso Valdes, "Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES)", Computer Science Laboratory SRI-CSL 95-06 May 1995. http://www.sdl.sri.com/papers/5/s/5sri/5sri.pdf
-
(1995)
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
2
-
-
0024924360
-
Modeling for text compression
-
Dec.
-
Bell, Timothy, Ian H. Witten, John G. Cleary, "Modeling for Text Compression", ACM Computing Surveys 21(4), pp. 557-591, Dec. 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 557-591
-
-
Bell, T.1
Witten, I.H.2
Cleary, J.G.3
-
3
-
-
32844462055
-
Detecting novel network intrusions using bayes estimators
-
Barbará, D., N. Wu, S. Jajodia, "Detecting Novel Network Intrusions using Bayes Estimators", First SIAM International Conference on Data Mining, 2001, http://www.siam/org/meetings/sdm01/pdf/sdm01_29.pdf
-
First SIAM International Conference on Data Mining, 2001
-
-
Barbará, D.1
Wu, N.2
Jajodia, S.3
-
4
-
-
0035416013
-
Difficulties in simulating the internet
-
Aug.
-
Floyd, S. and V. Paxson, "Difficulties in Simulating the Internet." IEEE/ACM Transactions on Networking Vol. 9, no. 4, pp. 392-403, Aug. 2001. http://www.icir.org/vern/papers.html
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.4
, pp. 392-403
-
-
Floyd, S.1
Paxson, V.2
-
5
-
-
0029716418
-
A sense of self for unix processes
-
Forrest, S., S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A Sense of Self for Unix Processes", Proceedings of 1996 IEEE Symposium on Computer Security and Privacy. ftp://ftp.cs.unm.edu/pub/forrest/ieee-sp-96-unix.pdf
-
Proceedings of 1996 IEEE Symposium on Computer Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Ghosh, A.K., A. Schwartzbard, M. Schatz, "Learning Program Behavior Profiles for Intrusion Detection", Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, April 9-12, 1999, Santa Clara, CA. http://www.cigital.com/-anup/usenix_id99.pdf
-
Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, April 9-12, 1999, Santa Clara, CA
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
7
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, C. Kreibich and V. Paxson, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics", Proc. USENIX Security Symposium, 2001.
-
Proc. USENIX Security Symposium, 2001
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
8
-
-
0004204715
-
A database of computer attacks for the evaluation of intrusion detection systems
-
Masters Thesis, MIT
-
Kendall, Kristopher, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems", Masters Thesis, MIT, 1999.
-
(1999)
-
-
Kendall, K.1
-
9
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4) 579-595, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
-
10
-
-
0141441130
-
PHAD: Packet header anomaly detection for identifying hostile network traffic
-
Florida Tech. technical report 2001-04
-
Mahoney, M., P. K. Chan, "PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic", Florida Tech. technical report 2001-04, http://cs.fit.edu/~tr/
-
-
-
Mahoney, M.1
Chan, P.K.2
-
11
-
-
85095970245
-
Experience with EMERALD to DATE
-
Neumann, P., and P. Porras, "Experience with EMERALD to DATE", Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999, 73-80, http://www.csl.sri.com/neumann/det99.html
-
Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999
, pp. 73-80
-
-
Neumann, P.1
Porras, P.2
-
12
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Paxson, Vern, "Bro: A System for Detecting Network Intruders in Real-Time", Lawrence Berkeley National Laboratory Proceedings, 7'th USENIX Security Symposium, Jan. 26-29, 1998, San Antonio TX, http://www.usenix.org/publications/library/proceedings/sec98/paxson.html
-
Lawrence Berkeley National Laboratory Proceedings, 7'th USENIX Security Symposium, Jan. 26-29, 1998, San Antonio TX
-
-
Paxson, V.1
-
14
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
January
-
Ptacek, Thomas H., and Timothy N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection", January, 1998, http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html
-
(1998)
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
16
-
-
80052381144
-
A strict anomaly detection model for IDS
-
Sasha/Beetle
-
Sasha/Beetle, "A Strict Anomaly Detection Model for IDS", Phrack 56(11), 2000, http://www.phrack.org
-
(2000)
Phrack
, vol.56
, Issue.11
-
-
-
18
-
-
0242698154
-
-
SPADE, Silicon Defense
-
SPADE, Silicon Defense, http://www.silicondefense.com/software/spice/
-
-
-
|