-
3
-
-
21944454128
-
Packets found on an internet
-
AT&T Bell Laboratories, May
-
S.M. Bellovin, "Packets Found on an Internet," technical report, AT&T Bell Laboratories, May 1992.
-
(1992)
Technical Report
-
-
Bellovin, S.M.1
-
4
-
-
84860495162
-
Modeling multistep cyber attacks for scenario recognition
-
Apr.
-
S. Cheung, U. Lindqvist, and M. Fong, "Modeling Multistep Cyber Attacks for Scenario Recognition," Proc. DARPA Information Survivability Conf. and Exposition (DISCEX III), pp. 284-292, Apr. 2003.
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition (DISCEX III)
, pp. 284-292
-
-
Cheung, S.1
Lindqvist, U.2
Fong, M.3
-
9
-
-
0023294428
-
An intrusion detection model
-
Feb.
-
D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
11
-
-
0006064357
-
Addendum to testing and evaluating computer intrusion detection systems
-
Sept.
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Addendum to Testing and Evaluating Computer Intrusion Detection Systems," Comm. ACM, vol. 42, no. 9, p. 15, Sept. 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.9
, pp. 15
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
12
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
July
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and Evaluating Computer Intrusion Detection Systems," Comm. ACM, vol. 42, no. 7, pp. 53-61, July 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
13
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S.T. Eckmann, G. Vigna, and R.A. Kemmerer, "STATL: An Attack Language for State-Based Intrusion Detection," J. Computer Security, vol. 10, nos. 1-2, pp. 71-104, 2002.
-
(2002)
J. Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
14
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
Dec.
-
A.K. Ghosh, J. Wanken, and F. Charron, "Detecting Anomalous and Unknown Intrusions against Programs," Proc. Ann. Computer Security Application Conf. (ACSAC '98), pp. 259-267, Dec. 1998.
-
(1998)
Proc. Ann. Computer Security Application Conf. (ACSAC '98)
, pp. 259-267
-
-
Ghosh, A.K.1
Wanken, J.2
Charron, F.3
-
15
-
-
21944448273
-
Correlating IDS alerts with vulnerability information
-
Tenable Network Security, Dec.
-
R. Gula, "Correlating IDS Alerts with Vulnerability Information," technical report, Tenable Network Security, Dec. 2002.
-
(2002)
Technical Report
-
-
Gula, R.1
-
16
-
-
3042821266
-
Validation of sensor alert correlators
-
Jan./Feb.
-
J. Haines, D.K. Ryder, L. Tinnel, and S. Taylor, "Validation of Sensor Alert Correlators," IEEE Security and Privacy Magazine, vol. 1, no. 1, pp. 46-56, Jan./Feb. 2003.
-
(2003)
IEEE Security and Privacy Magazine
, vol.1
, Issue.1
, pp. 46-56
-
-
Haines, J.1
Ryder, D.K.2
Tinnel, L.3
Taylor, S.4
-
17
-
-
0024984013
-
A network security monitor
-
May
-
L.T. Heberlein, G.V. Dias, K.N. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A Network Security Monitor," Proc. IEEE Symp. Research in Security and Privacy, pp. 296-304, May 1990.
-
(1990)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
19
-
-
84860961897
-
-
ISS, Realsecure, http://www.iss.net/, 2004.
-
(2004)
Realsecure
-
-
-
20
-
-
0004118981
-
The NIDES statistical component description and justification
-
SRI Int'l, Mar.
-
H.S. Javitz and A. Valdes, "The NIDES Statistical Component Description and Justification," technical report, SRI Int'l, Mar. 1994.
-
(1994)
Technical Report
-
-
Javitz, H.S.1
Valdes, A.2
-
22
-
-
0042958768
-
The design and implementation of tripwire: A file system integrity checker
-
Purdue Univ., Nov.
-
G.H. Kim and E.H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker", technical report, Purdue Univ., Nov. 1993.
-
(1993)
Technical Report
-
-
Kim, G.H.1
Spafford, E.H.2
-
23
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
May
-
C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach," Proc. 1997 IEEE Symp. Security and Privacy, pp. 175-187, May 1997.
-
(1997)
Proc. 1997 IEEE Symp. Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
26
-
-
21944435071
-
-
MIT Lincoln Laboratory, Lincoln Lab Data Sets, http://www.ll.mit.edu/IST/ ideval/data/data_index.html, 2000.
-
(2000)
Lincoln Lab Data Sets
-
-
-
27
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Jan.
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman, "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, Jan. 2000.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.2
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
28
-
-
84860957164
-
-
Vulnerabilities by Bugtraq ID
-
BugTraq Mailing List, Vulnerabilities by Bugtraq ID, http://www. securityfocus.com/bid/bugtraqid/, 2004.
-
(2004)
BugTraq Mailing List
-
-
-
29
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evalautions as performed by Lincoln Laboratory
-
Nov.
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evalautions as Performed by Lincoln Laboratory," ACM Trans. Information and System Security, vol. 3, no. 4, Nov. 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
30
-
-
21944447859
-
D.L. Mills network time protocol (Version 3)
-
D.L. Mills Network Time Protocol (Version 3), RFC 1305, 1992.
-
(1992)
RFC
, vol.1305
-
-
-
32
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
B. Morin, L. Me, H. Debar, and M. Ducasse, "M2D2: A Formal Data Model for IDS Alert Correlation," Proc. Recent Advances in Intrusion Detection, pp. 115-137, 2002.
-
(2002)
Proc. Recent Advances in Intrusion Detection
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
35
-
-
84958963784
-
Analyzing intensive intrusion alerts via correlation
-
Oct.
-
P. Ning, Y. Cui, and D.S. Reeves, "Analyzing Intensive Intrusion Alerts Via Correlation," Proc. Int'l Symp. the Recent Advances in Intrusion Detection, pp. 74-94, Oct. 2002.
-
(2002)
Proc. Int'l Symp. the Recent Advances in Intrusion Detection
, pp. 74-94
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
36
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Nov.
-
P. Ning, Y. Cui, and D.S. Reeves, "Constructing Attack Scenarios through Correlation of Intrusion Alerts," Proc. ACM Conf. Computer and Comm. Security, pp. 245-254, Nov. 2002.
-
(2002)
Proc. ACM Conf. Computer and Comm. Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
38
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Jan. 1998
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. Seventh USENIX Security Symp., Jan. 1998
-
Proc. Seventh USENIX Security Symp.
-
-
Paxson, V.1
-
39
-
-
84958955499
-
A mission-impact-based approach to INFOSEC alarm correlation
-
Oct.
-
P. Porras, M. Fong, and A. Valdes, "A Mission-Impact-Based Approach to INFOSEC Alarm Correlation," Proc. Int'l Symp. the Recent Advances in Intrusion Detection, pp. 95-114, Oct. 2002.
-
(2002)
Proc. Int'l Symp. the Recent Advances in Intrusion Detection
, pp. 95-114
-
-
Porras, P.1
Fong, M.2
Valdes, A.3
-
40
-
-
84860962829
-
-
UCSB Reliable Software Group, LinSTAT Webpage, http://www.cs.ucsb.edu/ rsg/STAT/software/linstat.html, 2003.
-
(2003)
LinSTAT Webpage
-
-
-
42
-
-
0003539116
-
Snort - Lightweight intrusion detection for networks
-
Nov.
-
M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," Proc. USENIX LISA '99 Conf., Nov. 1999
-
(1999)
Proc. USENIX LISA '99 Conf.
-
-
Roesch, M.1
-
46
-
-
0009552269
-
Adaptive, model-based monitoring for cyber attack detection
-
Oct.
-
A. Valdes and K. Skinner, "Adaptive, Model-Based Monitoring for Cyber Attack Detection," Proc. RAID 2000 Conf., Oct. 2000.
-
(2000)
Proc. RAID 2000 Conf.
-
-
Valdes, A.1
Skinner, K.2
-
49
-
-
20444487371
-
Teaching hands-on network security: Testbeds and live exercises
-
G. Vigna, "Teaching Hands-On Network Security: Testbeds and Live Exercises," J. Information Warfare, vol. 3, no. 2, pp. 8-25, 2003.
-
(2003)
J. Information Warfare
, vol.3
, Issue.2
, pp. 8-25
-
-
Vigna, G.1
-
50
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna and R.A. Kemmerer, "NetSTAT: A Network-Based Intrusion Detection System," J. Computer Security, vol. 7, no. 1, pp. 37-71, 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
52
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B.A. Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models," Proc. IEEE Symp. Security and Privacy, pp. 133-145, 1999.
-
(1999)
Proc. IEEE Symp. Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.A.3
|