-
1
-
-
85180737978
-
A lightweight tool for detecting web server attacks
-
San Diego, CA, February
-
M. Almgren, H. Debar, M. Dacier, A lightweight tool for detecting web server attacks, in: Proceedings of the ISOC Symposium on Network and Distributed Systems Security, San Diego, CA, February 2000
-
(2000)
Proceedings of the ISOC Symposium on Network and Distributed Systems Security
-
-
Almgren, M.1
Debar, H.2
Dacier, M.3
-
2
-
-
84947584994
-
Application-integrated data collection for security monitoring
-
Proceedings of recent advances in intrusion detection (RAID), Davis, CA, October 2001, Springer
-
M. Almgren, and U. Lindqvist Application-integrated data collection for security monitoring Proceedings of recent advances in intrusion detection (RAID), Davis, CA, October 2001 LNCS 2001 Springer 22 36
-
(2001)
LNCS
, pp. 22-36
-
-
Almgren, M.1
Lindqvist, U.2
-
5
-
-
8644227174
-
-
Exploiting Buffer Overflow In IIS Indexing Service DLL, Advisory CA-2001-19, July
-
CERT/CC, "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL, Advisory CA-2001-19, July 2001
-
(2001)
Code Red Worm
-
-
-
7
-
-
18744414325
-
The WWW common gateway Interface, version 1.1.
-
June
-
K. Coar, D. Robinson, The WWW Common Gateway Interface, Version 1.1. Internet Draft, June 1999
-
(1999)
Internet Draft
-
-
Coar, K.1
Robinson, D.2
-
8
-
-
18844393573
-
-
csSearch, 2004. Available from:
-
(2004)
-
-
-
11
-
-
0003355701
-
Hypertext transfer protocol-HTTP/1.1
-
June
-
R. Fielding et al., Hypertext Transfer Protocol-HTTP/1.1. RFC 2616, June 1999
-
(1999)
RFC
, vol.2616
-
-
Fielding, R.1
-
12
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
Oakland, CA, May
-
H. Feng, J. Giffin, Y. Huang, S. Jha, W. Lee, B. Miller, Formalizing sensitivity in static analysis for intrusion detection, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2004
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Giffin, J.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.6
-
13
-
-
0029716418
-
A sense of self for UNIX processes
-
Oakland, CA, May
-
S. Forrest, A sense of self for UNIX processes, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 120-128
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
-
14
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
Scottsdale, AZ, December
-
A.K. Ghosh, J. Wanken, F. Charron, Detecting anomalous and unknown intrusions against programs, in: Proceedings of the Annual Computer Security Application Conference (ACSAC'98), Scottsdale, AZ, December 1998, pp. 259-267
-
(1998)
Proceedings of the Annual Computer Security Application Conference (ACSAC'98)
, pp. 259-267
-
-
Ghosh, A.K.1
Wanken, J.2
Charron, F.3
-
17
-
-
18844422582
-
-
IMP Webmail Client. Available from:
-
-
-
-
18
-
-
18844427948
-
-
ISS, Realsecure. Available from:
-
-
-
-
19
-
-
0026154682
-
The SRI IDES statistical anomaly detector
-
Oakland, CA, May
-
H.S. Javitz, A. Valdes, The SRI IDES statistical anomaly detector, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1991
-
(1991)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Javitz, H.S.1
Valdes, A.2
-
21
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
Oakland, CA, May
-
C. Ko, M. Ruschitzka, K. Levitt, Execution monitoring of security-critical programs in distributed systems: a specification-based approach, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 175-187
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
22
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Las Vegas, NV, December
-
C. Kruegel, D. Mutz, W.K. Robertson, F. Valeur, Bayesian event classification for intrusion detection, in: Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003), Las Vegas, NV, December 2003
-
(2003)
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003)
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.K.3
Valeur, F.4
-
23
-
-
0142157009
-
On the detection of anomalous system call arguments
-
Proceedings of the 8th European symposium on research in computer security (ESORICS '03), Gjovik, Norway, October 2003, Springer-Verlag
-
C. Kruegel, D. Mutz, F. Valeur, and G. Vigna On the detection of anomalous system call arguments Proceedings of the 8th European symposium on research in computer security (ESORICS '03), Gjovik, Norway, October 2003 LNCS 2003 Springer-Verlag 326 343
-
(2003)
LNCS
, pp. 326-343
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
25
-
-
14844319067
-
Anomaly detection of Web-based attacks
-
ACM Press New York
-
C. Kruegel, and G. Vigna Anomaly detection of Web-based attacks Proceedings of the 10th ACM conference on computer and communication security (CCS'03), Washington, DC, October 2003 2003 ACM Press New York 251 261
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS'03), Washington, DC, October 2003
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
27
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, and S. Stolfo A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security 3 4 2000 227 261
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
29
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
Washington, DC
-
M. Liljenstam, D. Nicol, V. Berk, R. Gray, Simulating realistic network worm traffic for worm warning system design and testing, in: Proceedings of the ACM Workshop on Rapid Malcode, Washington, DC, 2003, pp. 24-33
-
(2003)
Proceedings of the ACM Workshop on Rapid Malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.2
Berk, V.3
Gray, R.4
-
30
-
-
0032630098
-
Detecting computer and network misuse with the production-based expert system toolset (P-BEST)
-
Oakland, CA, May
-
U. Lindqvist, P.A. Porras, Detecting computer and network misuse with the production-based expert system toolset (P-BEST), in: IEEE Symposium on Security and Privacy, Oakland, CA, May 1999, pp. 146-161
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
31
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
Edmonton Alberta, Canada
-
M. Mahoney, P. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks, in: Proceedings of the 8th International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, 2002, pp. 376-385
-
(2002)
Proceedings of the 8th International Conference on Knowledge Discovery and Data Mining
, pp. 376-385
-
-
Mahoney, M.1
Chan, P.2
-
33
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
San Antonio, TX, January
-
V. Paxson, Bro: a system for detecting network intruders in real-time, in: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Paxson, V.1
-
34
-
-
18844433715
-
-
Phorum: PHP Message Board. Available from:
-
-
-
-
36
-
-
3943051180
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, November
-
L. Portnoy, E. Eskin, S. Stolfo, Intrusion detection with unlabeled data using clustering, in: Proceedings of ACM CSS Workshop on Data Mining Applied to Security, Philadelphia, PA, November 2001
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
37
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
Seattle, WA, November
-
M. Roesch, Snort-lightweight intrusion detection for networks, in: Proceedings of the USENIX LISA '99 Conference, Seattle, WA, November 1999
-
(1999)
Proceedings of the USENIX LISA '99 Conference
-
-
Roesch, M.1
-
39
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Oakland, CA, May
-
R. Sekar, M. Bendre, P. Bollineni, D. Dhurjati, A fast automaton-based method for detecting anomalous program behaviors, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2001
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
43
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Zurich, Switzerland, October
-
K.M.C. Tan, K.S. Killourhy, R.A. Maxion, Undermining an anomaly-based intrusion detection system using common exploits, in: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID), Zurich, Switzerland, October 2002, pp. 54-73
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
44
-
-
0001790593
-
Depth-first search and linear graph algorithms
-
R. Tarjan Depth-first search and linear graph algorithms SIAM Journal of Computing 1 2 1972 10 20
-
(1972)
SIAM Journal of Computing
, vol.1
, Issue.2
, pp. 10-20
-
-
Tarjan, R.1
-
45
-
-
62349108537
-
A stateful intrusion detection system for world-wide Web servers
-
Las Vegas, NV, December
-
G. Vigna, W. Robertson, V. Kher, R.A. Kemmerer, A stateful intrusion detection system for world-wide Web servers, in: Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003), Las Vegas, NV, December 2003, pp. 34-43
-
(2003)
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003)
, pp. 34-43
-
-
Vigna, G.1
Robertson, W.2
Kher, V.3
Kemmerer, R.A.4
-
47
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
Washington, DC, November
-
D. Wagner, P. Soto, Mimicry attacks on host-based intrusion detection systems, in: Proceedings of the ACM Conference on Computer and Communications Security, Washington, DC, November 2002, pp. 255-264
-
(2002)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
48
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA
-
C. Warrender, S. Forrest, B.A. Pearlmutter, Detecting intrusions using system calls: alternative data models, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1999, pp. 133-145
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.A.3
|