-
1
-
-
67349165215
-
Composable tools for network discovery and security analysis
-
G. Vigna, F. Valeur, J. Zhou, and R. Kemmerer, "Composable tools for network discovery and security analysis," in Proc. 18th Annu. Computer Security Applications Conf. (ACSAC '02) pp. 14-24.
-
Proc. 18th Annu. Computer Security Applications Conf. (ACSAC '02)
, pp. 14-24
-
-
Vigna, G.1
Valeur, F.2
Zhou, J.3
Kemmerer, R.4
-
3
-
-
4244181748
-
Intrusion detection and vulnerability assessment
-
NSS, Cambridgeshire, U.K.
-
NSS Group, "Intrusion detection and vulnerability assessment," NSS, Cambridgeshire, U.K., Tech. Rep., 2000.
-
(2000)
Tech. Rep.
-
-
-
4
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
San Antonio, TX
-
V. Paxson, "Bro: a system for detecting network intruders in real-time," presented at the 7th USENIX Security Symp., San Antonio, TX, 1998.
-
(1998)
7th USENIX Security Symp.
-
-
Paxson, V.1
-
5
-
-
0005977876
-
From declarative signatures to misuse IDS
-
W. Lee, L. Mé, and A. Wespi Eds., Lecture Notes in Computer Science
-
J. Pouzol and M. Ducassé, "From declarative signatures to misuse IDS," in Proc. RAID Int. Symp. W. Lee, L. Mé, and A. Wespi Eds., 2001, vol. 2212, Lecture Notes in Computer Science, pp. 1-21.
-
(2001)
Proc. RAID Int. Symp.
, vol.2212
, pp. 1-21
-
-
Pouzol, J.1
Ducassé, M.2
-
6
-
-
33644535884
-
STATL: An attack language for state-based intrusion detection
-
Athens, Greece
-
S. Eckmann, G. Vigna, and R. Kemmerer, "STATL: an attack language for state-based intrusion detection," presented at the ACM Workshop Intrusion Detection Systems, Athens, Greece, 2000.
-
(2000)
ACM Workshop Intrusion Detection Systems
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
8
-
-
0036088115
-
Stateful intrusion detection for high-speed networks
-
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer, "Stateful intrusion detection for high-speed networks," in Proc. IEEE Symp. Security and Privacy 2002, pp. 285-293.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 285-293
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
9
-
-
0003539116
-
Snort - Lightweight intrusion detection for networks
-
Seattle, WA
-
M. Roesch, "Snort - lightweight intrusion detection for networks," presented at the USENIX LISA '99 Conf., Seattle, WA.
-
USENIX LISA '99 Conf.
-
-
Roesch, M.1
-
12
-
-
84861245249
-
-
ISS, [Online]
-
Realsecure. ISS, 2005 [Online]. Available: http://www.iss.net/
-
(2005)
Realsecure
-
-
-
13
-
-
0003892692
-
-
Master's thesis, Comput. Sci. Dept., Univ. California, Santa Barbara, Jul.
-
K. Ilgun, "USTAT: A real-time intrusion detection system for UNIX," Master's thesis, Comput. Sci. Dept., Univ. California, Santa Barbara, Jul. 1992.
-
(1992)
USTAT: A Real-time Intrusion Detection System for UNIX
-
-
Ilgun, K.1
-
14
-
-
0027150412
-
USTAT: A real-time intrusion detection system for UNIX
-
_, "USTAT: A real-time intrusion detection system for UNIX," in Proc. IEEE Symp. Security and Privacy 1993, pp. 16-28.
-
(1993)
Proc. IEEE Symp. Security and Privacy
, pp. 16-28
-
-
-
15
-
-
0004084716
-
-
Master's thesis, Comput. Sci. Dept., Univ. California, Santa Barbara, Jun.
-
P. Porras, "STAT - A state transition analysis tool for intrusion detection," Master's thesis, Comput. Sci. Dept., Univ. California, Santa Barbara, Jun. 1992.
-
(1992)
STAT - A State Transition Analysis Tool for Intrusion Detection
-
-
Porras, P.1
-
17
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection system
-
Mar.
-
K. Ilgun, R. Kemmerer, and P. Porras, "State transition analysis: a rule-based intrusion detection system," IEEE Trans. Softw. Eng., vol. 21, no. 3, pp. 181-199, Mar. 1995.
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
18
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S. Eckmann, G. Vigna, and R. Kemmerer, "STATL: an attack language for state-based intrusion detection," J. Comput. Secur., vol. 10, no. 1/2, pp. 71-104, 2002.
-
(2002)
J. Comput. Secur.
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
19
-
-
18744366186
-
-
[Online]
-
Apache 2.0 Documentation. 2002 [Online]. Available: http://www.apache. org/
-
(2002)
Apache 2.0 Documentation
-
-
-
20
-
-
0006062055
-
-
Mountain View, CA, Dec.
-
Sun Microsystems, Inc., "Installing, administering, and using the basic security module," Mountain View, CA, Dec. 1991.
-
(1991)
Installing, Administering, and Using the Basic Security Module
-
-
-
21
-
-
77954507857
-
Designing and implementing a family of intrusion detection systems
-
Helsinki, Finland
-
G. Vigna, F. Valeur, and R. Kemmerer, "Designing and implementing a family of intrusion detection systems," presented at the Eur. Software Engineering Conf. and ACM SIGSOFT Symp. Foundations of Software Engineering (ESEC/FSE 2003), Helsinki, Finland.
-
Eur. Software Engineering Conf. and ACM SIGSOFT Symp. Foundations of Software Engineering (ESEC/FSE 2003)
-
-
Vigna, G.1
Valeur, F.2
Kemmerer, R.3
-
22
-
-
84947584002
-
Designing a web of highly-configurable intrusion detection sensors
-
W. Lee, L. Me, and A. Wespi Eds., Lecture Notes in Computer Science
-
G. Vigna, R. Kemmerer, and P. Blix, "Designing a web of highly-configurable intrusion detection sensors," in Proc. 4th Int. Symp. Recent Advances in Intrusion Detection (RAID 2001) W. Lee, L. Me, and A. Wespi Eds., vol. 2212, Lecture Notes in Computer Science, pp. 69-84.
-
Proc. 4th Int. Symp. Recent Advances in Intrusion Detection (RAID 2001)
, vol.2212
, pp. 69-84
-
-
Vigna, G.1
Kemmerer, R.2
Blix, P.3
-
24
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
_, "NetSTAT: a network-based intrusion detection system," J. Comput. Secur., vol. 7, no. 1, pp. 37-71, 1999.
-
(1999)
J. Comput. Secur.
, vol.7
, Issue.1
, pp. 37-71
-
-
-
25
-
-
84861266125
-
An intrusion detection system for Aglets
-
N. Suri Ed., Lecture Notes in Computer Science
-
G. Vigna, B. Cassell, and D. Fayram, "An intrusion detection system for Aglets," in Proc. 6th Int. Conf. Mobile Agents (MA '02) N. Suri Ed., vol. 2535, Lecture Notes in Computer Science, pp. 64-77.
-
Proc. 6th Int. Conf. Mobile Agents (MA '02)
, vol.2535
, pp. 64-77
-
-
Vigna, G.1
Cassell, B.2
Fayram, D.3
-
26
-
-
62349108537
-
A stateful intrusion detection system for world-wide web servers
-
G. Vigna, W. Robertson, V. Kher, and R. Kemmerer, "A stateful intrusion detection system for world-wide web servers," in Proc. Annu. Computer Security Applications Conf. (ACSAC 2003) pp. 34-43.
-
Proc. Annu. Computer Security Applications Conf. (ACSAC 2003)
, pp. 34-43
-
-
Vigna, G.1
Robertson, W.2
Kher, V.3
Kemmerer, R.4
-
27
-
-
77953188431
-
Detecting malicious Java code using virtual machine auditing
-
V. Paxson Ed.
-
S. Soman, C. Krintz, and G. Vigna, "Detecting malicious Java code using virtual machine auditing," in Proc. 12th USENIX Security Symp. V. Paxson Ed., 2003, pp. 153-167.
-
(2003)
Proc. 12th USENIX Security Symp.
, pp. 153-167
-
-
Soman, S.1
Krintz, C.2
Vigna, G.3
-
28
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
G. Vigna, S. Gwalani, K. Srinivasan, E. Belding-Royer, and R. Kemmerer, "An intrusion detection tool for AODV-based ad hoc wireless networks," in Proc. Annu. Computer Security Applications Conf. (ACSAC) 2004, pp. 16-27.
-
(2004)
Proc. Annu. Computer Security Applications Conf. (ACSAC)
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.4
Kemmerer, R.5
-
30
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Jul.
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," CACM, vol. 42, no. 7, pp. 53-61, Jul. 1999.
-
(1999)
CACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
31
-
-
0006064357
-
Addendum to "testing and evaluating computer intrusion detection systems"
-
Sep.
-
_, "Addendum to "testing and evaluating computer intrusion detection systems"," CACM, vol. 42, no. 9, p. 15, Sep. 1999.
-
(1999)
CACM
, vol.42
, Issue.9
, pp. 15
-
-
-
32
-
-
3042821266
-
Validation of sensor alert correlators
-
Jan./Feb.
-
J. Haines, D. Ryder, L. Tinnel, and S. Taylor, "Validation of sensor alert correlators," IEEE Security Privacy, vol. 1, no. 1, pp. 46-56, Jan./Feb. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.1
, pp. 46-56
-
-
Haines, J.1
Ryder, D.2
Tinnel, L.3
Taylor, S.4
-
33
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Jul.-Sep.
-
F. Valeur, G. Vigna, C. Kruegel, and R. Kemmerer, "A comprehensive approach to intrusion detection alert correlation," IEEE Trans. Depend. Secure Comput., vol. 1, no. 3, pp. 146-169, Jul.-Sep. 2004.
-
(2004)
IEEE Trans. Depend. Secure Comput.
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
|