-
1
-
-
18744410777
-
-
arachNIDS. http://whitehats.com/ids/.
-
-
-
-
2
-
-
18744407969
-
-
Web archive of versions of software and signatures used in this paper. http://www.net.in.tum.de/~robin/ccs03.
-
-
-
-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
August
-
S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3):186-205, August 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
4
-
-
0003907293
-
-
Macmillan Technical Publishing, Indianapolis, IN, USA
-
R. G. Bace. Intrusion Detection. Macmillan Technical Publishing, Indianapolis, IN, USA, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
6
-
-
18744396492
-
-
Bugtraq. http://www.securityfocus.com/bid/1187.
-
-
-
-
7
-
-
18744399418
-
-
CERT Advisory CA-2002-27 Apache/mod_ssl Worm
-
CERT Advisory CA-2002-27 Apache/mod_ssl Worm. http://www.cert-org/ advisories/CA-2002-27.html.
-
-
-
-
10
-
-
84880755155
-
Evaluation of the diagnostic capabilities of commercial intrusion detection systems
-
number 2516 in Lecture Notes in Computer Science. Springer-Verlag
-
H. Debar and B. Morin. Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Proc. Recent Advances in Intrusion Detection
-
-
Debar, H.1
Morin, B.2
-
12
-
-
1542350966
-
Fast content-based packet handling for intrusion detection
-
UC San Diego, May
-
M. Fisk and G. Varghese. Fast Content-Based Packet Handling for Intrusion Detection. Technical Report CS2001-0670, UC San Diego, May 2001.
-
(2001)
Technical Report
, vol.CS2001-0670
-
-
Fisk, M.1
Varghese, G.2
-
13
-
-
18744362822
-
Remote OS detection via TCP/IP stack finger printing
-
Fyodor
-
Fyodor. Remote OS detection via TCP/IP Stack Finger Printing. Phrack Magazine, 8(54), 1998.
-
(1998)
Phrack Magazine
, vol.8
, Issue.54
-
-
-
15
-
-
33750943764
-
Capacity verification for high speed network intrusion detection systems
-
number 2516 in Lecture Notes in Computer Science. Springer-Verlag
-
M. Hall and K. Wiley. Capacity Verification for High Speed Network Intrusion Detection Systems. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Proc. Recent Advances in Intrusion Detection
-
-
Hall, M.1
Wiley, K.2
-
16
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Washington, D.C., August
-
M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. 10th USENIX Security Symposium, Washington, D.C., August 2001.
-
(2001)
Proc. 10th USENIX Security Symposium
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
17
-
-
0026932950
-
Incremental generation of lexical scanners
-
J. Heering, P. Klint, and J. Rekers. Incremental generation of lexical scanners. ACM Transactions on Programming Languages and Systems (TOPLAS), 14(4):490-520, 1992.
-
(1992)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.14
, Issue.4
, pp. 490-520
-
-
Heering, J.1
Klint, P.2
Rekers, J.3
-
19
-
-
0344871633
-
Intrusion detection system product survey
-
Los Alamos National Laboratory, June
-
K. Jackson. Intrusion detection system product survey. Technical Report LA-UR-99-3883, Los Alamos National Laboratory, June 1999.
-
(1999)
Technical Report
, vol.LA-UR-99-3883
-
-
Jackson, K.1
-
20
-
-
84940110274
-
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
-
IEEE Computer Society Press, May
-
U. Lindqvist and P. A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proc. IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 1999.
-
(1999)
Proc. IEEE Symposium on Security and Privacy
-
-
Lindqvist, U.1
Porras, P.A.2
-
21
-
-
24744463914
-
Results of the 1998 DARPA offline intrusion detection evaluation
-
R. Lippmann, R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, and M. A. Zissman. Results of the 1998 DARPA Offline Intrusion Detection Evaluation. In Proc. Recent Advances in Intrusion Detection, 1999.
-
(1999)
Proc. Recent Advances in Intrusion Detection
-
-
Lippmann, R.1
Cunningham, R.K.2
Fried, D.J.3
Graf, I.4
Kendall, K.R.5
Webster, S.E.6
Zissman, M.A.7
-
22
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
October
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4):579-595, October 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
23
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
number 2516 in Lecture Notes in Computer Science. Springer-Verlag
-
R. Lippmann, S. Webster, and D. Stetson. The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Proc. Recent Advances in Intrusion Detection
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
24
-
-
85019691440
-
Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
November
-
J. McHugh. Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security, 3(4):262-294, November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
25
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
26
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, MD, October
-
P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In National Information Systems Security Conference, Baltimore, MD, October 1997.
-
(1997)
National Information Systems Security Conference
-
-
Porras, P.A.1
Neumann, P.G.2
-
27
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc., January
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., January 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
28
-
-
80051517712
-
Implementing a generalised tool for network monitoring
-
M. J. Ranum, K. Landfield, M. Stolarchuk, M. Sienkiewicz, A. Lambeth, and E. Wall. Implementing a generalised tool for network monitoring. In Proc. 11th Systems Administration Conference (USA), 1997.
-
(1997)
Proc. 11th Systems Administration Conference (USA)
-
-
Ranum, M.J.1
Landfield, K.2
Stolarchuk, M.3
Sienkiewicz, M.4
Lambeth, A.5
Wall, E.6
-
29
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
USENIX Association, November
-
M. Roesch. Snort: Lightweight intrusion detection for networks. In Proc. 13th Systems Administration Conference (LISA), pages 229-238. USENIX Association, November 1999.
-
(1999)
Proc. 13th Systems Administration Conference (LISA)
, pp. 229-238
-
-
Roesch, M.1
-
30
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
USENIX Association, August
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proc. 8th USENIX Security Symposium. USENIX Association, August 1999.
-
(1999)
Proc. 8th USENIX Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
33
-
-
18744397358
-
-
tcpdump. http://www.tcpdump.org.
-
-
-
-
34
-
-
18744391782
-
-
Valgrind. http://developer.kde.org/~sewardj.
-
-
-
-
35
-
-
84860434876
-
The STAT tool suite
-
Hilton Head, South Carolina, January IEEE Computer Society Press
-
G. Vigna, S. Eckmann, and R. Kemmerer. The STAT Tool Suite. In Proc. 1st DARPA Information Survivability Conference and Exposition, Hilton Head, South Carolina, January 2000. IEEE Computer Society Press.
-
(2000)
Proc. 1st DARPA Information Survivability Conference and Exposition
-
-
Vigna, G.1
Eckmann, S.2
Kemmerer, R.3
-
36
-
-
0002067431
-
Netstat: A network-based intrusion detection system
-
G. Vigna and R. A. Kemmerer. Netstat: A network-based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
37
-
-
18744398863
-
-
Whisker, http://www.wiretrip.net/rfp.
-
-
-
|