-
1
-
-
84860969342
-
-
Digital information society. Available at www.phreak.org.
-
-
-
-
2
-
-
4444272036
-
-
IBM Zurich Research Laboratory, September. Deliverable D3, Project MAFTIA IST-1999-11583
-
D. Alessandri, editor. Towards a Taxonomy of Intrusion Detection Systems and Attacks. IBM Zurich Research Laboratory, September 2001. Deliverable D3, Project MAFTIA IST-1999-11583, Available at www.maftia.org.
-
(2001)
Towards a Taxonomy of Intrusion Detection Systems and Attacks
-
-
Alessandri, D.1
-
3
-
-
4544265969
-
-
Syngress, Feb.
-
B. Caswell, J. Bealeand, J. C. Foster, and J. Faircloth. Snort 2.0 Intrusion Detection, Syngress, Feb. 2003.
-
(2003)
Snort 2.0 Intrusion Detection
-
-
Caswell, B.1
Bealeand, J.2
Foster, J.C.3
Faircloth, J.4
-
4
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Washington, DC, August
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In USENIX Security Symposium, Washington, DC, August 2003.
-
(2003)
USENIX Security Symposium
-
-
Christodorescu, M.1
Jha, S.2
-
5
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
Washington, DC, August
-
S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In USENIX Security Symposium, Washington, DC, August 2003.
-
(2003)
USENIX Security Symposium
-
-
Crosby, S.1
Wallach, D.2
-
6
-
-
4544359276
-
-
IBM Zurich Research Laboratory, August. Deliverable D10, Project MAFTIA IST-1999-11583
-
M. Dacier, editor. Design of an Intrusion-Tolerant Intrusion Detection System. IBM Zurich Research Laboratory, August 2002. Deliverable D10, Project MAFTIA IST-1999-11583, Available at www.maftia.org.
-
(2002)
Design of An Intrusion-tolerant Intrusion Detection System
-
-
Dacier, M.1
-
7
-
-
18744414884
-
Evaluation of the diagnostic capabilities of commercial intrusion detection systems
-
Zurich, Switzerland, October
-
H. Debar and B. Morin. Evaluation of the diagnostic capabilities of commercial intrusion detection systems. In International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, October 2002.
-
(2002)
International Symposium on Recent Advances in Intrusion Detection
-
-
Debar, H.1
Morin, B.2
-
8
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
August
-
T. Detristan, T. Ulenspiegel, Y. Malcom, and M. S. Underduk. Polymorphic shellcode engine using spectrum analysis. Phrack Online Magazine, 61, August 2003.
-
(2003)
Phrack Online Magazine
, vol.61
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.S.4
-
10
-
-
0003415244
-
-
The Internet Engineering Task Force, June
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. RFC 2616 - Hypertext Transfer Protocol. The Internet Engineering Task Force, June 1999.
-
(1999)
RFC 2616 - Hypertext Transfer Protocol
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
12
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Washington, DC, August
-
M. Handley and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In USENIX Security Symposium, Washington, DC, August 2001.
-
(2001)
USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
-
13
-
-
84860956474
-
-
Internet Security Systems. RealSecure Network 10/100. Available at http://www.iss.net/.
-
RealSecure Network 10/100
-
-
-
14
-
-
84948431640
-
Stateful intrusion detection for high-speed networks
-
Oakland, CA, May
-
C. Kruegel, F. Valeur, G. Vigna, and R. A. Kemmerer. Stateful intrusion detection for high-speed networks. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.A.4
-
15
-
-
33745651405
-
Performance adaptation in real-time intrusion detection systems
-
Zurich, Switzerland, October
-
W. Lee, J. B. D. Cabrera, A. Thomas, N. Balwalli, S. Saluja, and Y. Zhang. Performance adaptation in real-time intrusion detection systems. In International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, October 2002.
-
(2002)
International Symposium on Recent Advances in Intrusion Detection
-
-
Lee, W.1
Cabrera, J.B.D.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
16
-
-
0012249167
-
Analysis and results of the 1999 DARPA off-line intrusion detection evaluation
-
Toulouse, France, October
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. Analysis and results of the 1999 DARPA off-line intrusion detection evaluation. In International Symposium on Recent Advances in Intrusion Detection, Toulouse, France, October 2000.
-
(2000)
International Symposium on Recent Advances in Intrusion Detection
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
17
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, SC, January
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In DARPA Information Survivability Conference and Exposition, Hilton Head, SC, January 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
19
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
November
-
J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security, 3(4), November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
22
-
-
84903593793
-
An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
-
Las Vegas, NV, December
-
D. Mutz, G. Vigna, and R. Kemmerer. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems. In Annual Computer Security Applications Conference, Las Vegas, NV, December 2003.
-
(2003)
Annual Computer Security Applications Conference
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.3
-
24
-
-
0040793976
-
Mechanized proofs of security protocols: Needham-schroeder with public keys
-
University of Cambridge Computer Laboratory
-
L. Paulson. Mechanized proofs of security protocols: Needham-Schroeder with public keys. Technical Report 413, University of Cambridge Computer Laboratory, 1997.
-
(1997)
Technical Report
, vol.413
-
-
Paulson, L.1
-
25
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23/24), December 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
-
-
Paxson, V.1
-
30
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc., Calgary, Alberta, Canada
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical Report T2R-0Y6, Secure Networks, Inc., Calgary, Alberta, Canada, 1998.
-
(1998)
Technical Report
, vol.T2R-0Y6
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
34
-
-
21644481066
-
Attack generation for NIDS testing using natural deduction
-
University of Wisconsin, Madison, January
-
S. Rubin, S. Jha, and B. P. Miller. Attack generation for NIDS testing using natural deduction. Technical Report 1496, University of Wisconsin, Madison, January 2004.
-
(2004)
Technical Report
, vol.1496
-
-
Rubin, S.1
Jha, S.2
Miller, B.P.3
-
37
-
-
84899126047
-
Active mapping: Resisting NIDS evasion without altering traffic
-
Oakland, CA, May
-
U. Shankar and V. Paxson. Active mapping: Resisting NIDS evasion without altering traffic. In IEEE Symposium. on Security and Privacy, Oakland, CA, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Shankar, U.1
Paxson, V.2
-
39
-
-
84860965379
-
-
Sniphs. Snot, January
-
Sniphs. Snot, January 2003. Available at www.stolenshoes.net/sniph/index.html.
-
(2003)
-
-
-
40
-
-
14844324904
-
Enhancing byte-level network intrusion detection signatures with context
-
Washington, DC, October
-
R. Sommer and V. Paxson. Enhancing byte-level network intrusion detection signatures with context. In ACM Conference on Computer and Communications Security, Washington, DC, October 2003.
-
(2003)
ACM Conference on Computer and Communications Security
-
-
Sommer, R.1
Paxson, V.2
-
43
-
-
0012781111
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Zurich, Switzerland, October
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, October 2002.
-
(2002)
International Symposium on Recent Advances in Intrusion Detection
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
44
-
-
4544230873
-
Hiding intrusions: From the abnormal to the normal and beyond
-
Noordwijkerhout, Netherlands, Oct.
-
K. M. C. Tan, J. McHugh, and K. S. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In The 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands, Oct. 2002.
-
(2002)
The 5th International Workshop on Information Hiding
-
-
Tan, K.M.C.1
McHugh, J.2
Killourhy, K.S.3
-
47
-
-
84860969343
-
-
The Tcpdump Group. TCPDUMP/LIBPCAP. Available at www.tcpdump.org.
-
-
-
-
48
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant exploits
-
Washington, DC, October
-
G. Vigna, W. Robertson, and D. Balzarotti. Testing network-based intrusion detection signatures using mutant exploits. In ACM Conference on Computer and Communications Security, Washington, DC, October 2004.
-
(2004)
ACM Conference on Computer and Communications Security
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
|