-
2
-
-
84862356642
-
-
DARPA OASIS (Organically Assured and Survivable Information System), http://www.tolerantsystems.org/index.html.
-
-
-
-
3
-
-
84862361326
-
Malicious- And accidental-fault tolerance for internet applications
-
IST Programme
-
Malicious- and Accidental-Fault Tolerance for Internet Applications. RTD Research Project IST-1999-11583, IST Programme, http://maftia.org/.
-
RTD Research Project IST-1999-11583
-
-
-
4
-
-
84862356244
-
Microsoft security tool kit: Installing and securing a new windows 2000 system
-
Microsoft Security Tool Kit: Installing and Securing a New Windows 2000 System. Microsoft TechNet. http://www.microsoft.com/technet/ security/tools/tools/w2knew.asp.
-
Microsoft TechNet
-
-
-
5
-
-
84862356648
-
-
Microsoft Windows Software Update Services. http://www.microsoft.com/ windows2000/windowsupdate/sus/.
-
-
-
-
7
-
-
84862361328
-
-
RedHat 9 Security Advisories. https://rhn.redhat.com/errata/rh9-errata- security.html.
-
-
-
-
9
-
-
84862371886
-
Using network-based application recognition and access control lists for blocking the "Code Red" worm at network ingress points
-
Cisco Systems, Inc.
-
Using Network-Based Application Recognition and Access Control Lists for Blocking the "Code Red" Worm at Network Ingress Points. Technical report, Cisco Systems, Inc.
-
Technical Report
-
-
-
10
-
-
34547985501
-
-
Web Server Survey, http://www.securityspace. com/s_survey/data/200304/.
-
Web Server Survey
-
-
-
11
-
-
84862362324
-
-
Intrusion Tolerant Server Infrastructure. http://www.tolerantsystems.org/ ProjectSummaries/Intrusion_Tolerant_Serv%er_Infrastructure.html, 2000.
-
(2000)
Intrusion Tolerant Server Infrastructure
-
-
-
13
-
-
2642519394
-
-
Cert Advisory CA-2003-04: January
-
Cert Advisory CA-2003-04: MS-SQL Server Worm. http://www.cert.org/ advisories/ CA-2003-04.html, January 2003.
-
(2003)
MS-SQL Server Worm
-
-
-
15
-
-
0038687767
-
Efficient, DoS-resistant, secure key exchange for internet protocols
-
November
-
W. Aiello, S. M. Bellovin, M. Blaze, R. Canetti, J. Ioannidis, A. D. Keromytis, and O. Reingold. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. In Proceedings of the ACM Computer and Communications Security (CCS) Conference, pages 48-58, November 2003.
-
(2003)
Proceedings of the ACM Computer and Communications Security (CCS) Conference
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
16
-
-
2642545485
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
Zurich, Switzerland, October
-
F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. J. Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses. In Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), Zurich, Switzerland, October 2002.
-
(2002)
Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002)
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.J.5
-
17
-
-
38049107552
-
Building auto-adaptive distributed applications: The QuO-APOD experience
-
May
-
M. Atighetchi, P. Pal, C. Jones, P. Rubel, R. Schantz, J. Loyall, and J. Zinky. Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. In Proceedings of the 3rd International Workshop on Distributed Auto-adaptive and Reconfigurable Systems, in conjunction with the 23rd International Conference on Distributed Computing Systems, May 2003.
-
(2003)
Proceedings of the 3rd International Workshop on Distributed Auto-adaptive and Reconfigurable Systems, in Conjunction with the 23rd International Conference on Distributed Computing Systems
-
-
Atighetchi, M.1
Pal, P.2
Jones, C.3
Rubel, P.4
Schantz, R.5
Loyall, J.6
Zinky, J.7
-
22
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
August
-
A. Carzaniga, D. Rosenblum, and A. Wolf. Design and evaluation of a wide-area event notification service. In ACM Transactions on Computer Systems, volume 19(3), pages 332-383, August 2001.
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.2
Wolf, A.3
-
24
-
-
66249131125
-
WebSOS: Protecting web servers from DDoS attacks
-
September/October
-
D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra, and D. Rubenstein. WebSOS: Protecting Web Servers From DDoS Attacks. In Proceedings of the IEEE International Conference on Networks (ICON), September/October 2003.
-
(2003)
Proceedings of the IEEE International Conference on Networks (ICON)
-
-
Cook, D.L.1
Morein, W.G.2
Keromytis, A.D.3
Misra, V.4
Rubenstein, D.5
-
25
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
30
-
-
8644229619
-
The art of port scanning
-
7, September
-
Fyodor. The art of port scanning. Phrack 51, 7, September 1997. http://www.phrack.com/phrack/51/P51-11.
-
(1997)
Phrack
, vol.51
-
-
-
31
-
-
0006411884
-
Inoculating software for survivability
-
A. K. Ghosh and J. M. Voas. Inoculating software for survivability. Communications of the ACM, 42(7):38-44, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 38-44
-
-
Ghosh, A.K.1
Voas, J.M.2
-
32
-
-
2642573975
-
Host-based anomaly detection by wrapping file system accesses
-
Columbia University Department of Computer Science, April
-
S. Hershkop, R. Ferster, L. H. Bui, K. Wang, and S. J. Stolfo. Host-based anomaly detection by wrapping file system accesses. Technical report, Columbia University Department of Computer Science, April 2003.
-
(2003)
Technical Report
-
-
Hershkop, S.1
Ferster, R.2
Bui, L.H.3
Wang, K.4
Stolfo, S.J.5
-
34
-
-
0034449536
-
Implementing a distributed firewall
-
November
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith. Implementing a Distributed Firewall. In Proceedings of Computer and Communications Security (CCS), pages 190-199, November 2000.
-
(2000)
Proceedings of Computer and Communications Security (CCS)
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
36
-
-
0004118981
-
The nides statistical component: Description and justification
-
SRI International
-
H. S. Javitz and A. Valdes. The nides statistical component: Description and justification. Technical report, SRI International, 1993.
-
(1993)
Technical Report
-
-
Javitz, H.S.1
Valdes, A.2
-
37
-
-
2642547091
-
Learning unknown attacks - A start
-
October
-
J. E. Just, L. A. Clough, M. Danforth, K. N. Levitt, R. Maglich, J. C. Reynolds, and J. Rowe. Learning Unknown Attacks - A Start. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID), October 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Just, J.E.1
Clough, L.A.2
Danforth, M.3
Levitt, K.N.4
Maglich, R.5
Reynolds, J.C.6
Rowe, J.7
-
38
-
-
84954167050
-
Kinesthetics extreme: An external infrastructure for monitoring distributed legacy systems
-
G. Kaiser, J. Parekh, P. Gross, and G. Valetto. Kinesthetics extreme: An external infrastructure for monitoring distributed legacy systems. In Proceedings of the Autonomic Computing Workshop, Fifth Annual Workshop on Active Middleware Services, 2003.
-
(2003)
Proceedings of the Autonomic Computing Workshop, Fifth Annual Workshop on Active Middleware Services
-
-
Kaiser, G.1
Parekh, J.2
Gross, P.3
Valetto, G.4
-
39
-
-
0003068282
-
Security architecture for the internet protocol
-
Nov.
-
S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401, Nov. 1998.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
42
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
December
-
C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilities in privileged programs by execution monitoring. In 10th Annual Computer Security Applications Conference, pages 134-144, December 1994.
-
(1994)
10th Annual Computer Security Applications Conference
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
43
-
-
2642548739
-
Feedback control applied to survivability: A host-based autonomic defense system
-
September
-
O. Kreidl and T. Frazier. Feedback control applied to survivability: a host-based autonomic defense system. IEEE Transactions on Reliability, Vol. 52, No. 3, September 2003.
-
(2003)
IEEE Transactions on Reliability
, vol.52
, Issue.3
-
-
Kreidl, O.1
Frazier, T.2
-
48
-
-
0344008570
-
Detecting novel attacks by identifying anomalous network packet headers
-
Florida Institute of Technology, Melbourne, FL
-
M. Mahoney and P. Chan. Detecting novel attacks by identifying anomalous network packet headers. Technical Report CS-2001-2, Florida Institute of Technology, Melbourne, FL, 2001.
-
(2001)
Technical Report CS-2001-2
-
-
Mahoney, M.1
Chan, P.2
-
50
-
-
0003681204
-
-
Addison Wesley Longman, February
-
D. Milojicic, F. Douglis, and R. Wheeler. Mobility: Pro-cesses, Computers, and Agents. Addison Wesley Longman, February 1999.
-
(1999)
Mobility: Pro-cesses, Computers, and Agents
-
-
Milojicic, D.1
Douglis, F.2
Wheeler, R.3
-
53
-
-
2642560961
-
Crying wolf: False alarms hide attacks
-
June
-
D. Newman, J. Snyder, and R. Thayer. Crying wolf: False alarms hide attacks. Network World, June 2002. http://www.nwfusion.com/techinsider/ 2002/0624security1.html.
-
(2002)
Network World
-
-
Newman, D.1
Snyder, J.2
Thayer, R.3
-
56
-
-
84978437417
-
The design and implementation of Zap: A system for migrating computing environments
-
Boston, MA, December
-
S. Osman, D. Subhraveti, G. Su, and J. Nieh. The design and implementation of Zap: A system for migrating computing environments. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), pages 361-376, Boston, MA, December 2002.
-
(2002)
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002)
, pp. 361-376
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
57
-
-
84966929628
-
Adaptive use of netwokr-centric mechanisms in cyber-defense
-
May
-
P. PAl, M. Atighetchi, F. Webber, R. Schantz, and C. Jones. Adaptive Use of Netwokr-Centric Mechanisms in Cyber-Defense. In Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing, May 2003.
-
(2003)
Proceedings of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing
-
-
Pal, P.1
Atighetchi, M.2
Webber, F.3
Schantz, R.4
Jones, C.5
-
58
-
-
70349527267
-
Reflections on Evaluating survivability: The APOD experiments
-
April
-
P. Pal, M. Atighetchi, F. Webber, R. Schantz, and C. Jones. Reflections on Evaluating Survivability: The APOD Experiments. In Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications, April 2003.
-
(2003)
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications
-
-
Pal, P.1
Atighetchi, M.2
Webber, F.3
Schantz, R.4
Jones, C.5
-
59
-
-
84862357381
-
Using context-based correlation in network operations management
-
Stanford University Department of Computer Science
-
L. Perrochon. Using context-based correlation in network operations management. Technical report, Stanford University Department of Computer Science, 1999. http://pavg.stanford.edu/cep/cidf.ps.gz.
-
(1999)
Technical Report
-
-
Perrochon, L.1
-
61
-
-
2642547913
-
On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization
-
January
-
J. C. Reynolds, J. Just, L. Clough, and R. Maglich. On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS), January 2003.
-
(2003)
Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS)
-
-
Reynolds, J.C.1
Just, J.2
Clough, L.3
Maglich, R.4
-
62
-
-
0036931592
-
The design and implementation of an intrusion tolerant system
-
June
-
J. C. Reynolds, J. Just, E. Lawson, L. Clough, and R. Maglich. The Design and Implementation of an Intrusion Tolerant System. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), June 2002.
-
(2002)
Proceedings of the International Conference on Dependable Systems and Networks (DSN)
-
-
Reynolds, J.C.1
Just, J.2
Lawson, E.3
Clough, L.4
Maglich, R.5
-
65
-
-
84976720856
-
The "worm" programs - Early experiments with a distributed computation
-
March
-
J. F. Shoch and J. A. Hupp. The "worm" programs - early experiments with a distributed computation. Communications of the ACM, 22(3):172-180, March 1982.
-
(1982)
Communications of the ACM
, vol.22
, Issue.3
, pp. 172-180
-
-
Shoch, J.F.1
Hupp, J.A.2
-
70
-
-
2642522650
-
Intrusion detection, diagnosis, and recovery with self-securing storage
-
Carnegie Mellon University
-
J. D. Strunk, G. R. Goodson, A. G. Pennington, C. A. Soules, and G. R. Ganger. Intrusion detection, diagnosis, and recovery with self-securing storage. Technical report, Carnegie Mellon University, 2002.
-
(2002)
Technical Report
-
-
Strunk, J.D.1
Goodson, G.R.2
Pennington, A.G.3
Soules, C.A.4
Ganger, G.R.5
-
73
-
-
0742317706
-
Sitar: A scalable intrusion tolerance architecture for distributed servers
-
F. Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. Trivedi, and F. Jou. Sitar: A scalable intrusion tolerance architecture for distributed servers. In Proceedings of the IEEE 2nd SMC Information Assurance Workshop, 2001.
-
(2001)
Proceedings of the IEEE 2nd SMC Information Assurance Workshop
-
-
Wang, F.1
Gong, F.2
Sargor, C.3
Goseva-Popstojanova, K.4
Trivedi, K.5
Jou, F.6
-
74
-
-
11144337234
-
SITAR: A scalable intrusion-tolerant architecture for distributed services
-
April
-
F. Wang and R. Uppalli. SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In Volume II of the Proceedings of DISCEX III, pages 153-155, April 2003.
-
(2003)
Volume II of the Proceedings of DISCEX III
, vol.2
, pp. 153-155
-
-
Wang, F.1
Uppalli, R.2
-
75
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: alternative data models. pages 133-145. IEEE Computer Society, 1999.
-
(1999)
IEEE Computer Society
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
76
-
-
2642574790
-
Bend, don't break: Using reconfiguration to achieve survivability
-
October
-
A. Wolf, D. Heimbigner, A.Carzaniga, J. Knight, P. Devenbu, and M. Gertz. Bend, don't break: Using reconfiguration to achieve survivability. In Proceedings of the Third Information Survivability Workshop (ISW2000), pages 187-190, October 2000.
-
(2000)
Proceedings of the Third Information Survivability Workshop (ISW2000)
, pp. 187-190
-
-
Wolf, A.1
Heimbigner, D.2
Carzaniga, A.3
Knight, J.4
Devenbu, P.5
Gertz, M.6
-
77
-
-
2642574790
-
Bend, don't break: Using reconfiguration to achieve survivability
-
October
-
A. Wolf, D. Heimbigner, A. Carzaniga, J. Knight, P. Devenbu, and M. Gertz. Bend, Don't Break: Using Reconfiguration to Achieve Survivability. In Proceedings of the 3rd Information Survivability Workshop, pages 187-190, October 2000.
-
(2000)
Proceedings of the 3rd Information Survivability Workshop
, pp. 187-190
-
-
Wolf, A.1
Heimbigner, D.2
Carzaniga, A.3
Knight, J.4
Devenbu, P.5
Gertz, M.6
-
78
-
-
33244459492
-
A stackable file system interface for linux
-
May
-
E. Zadok and I. Badulescu. A stackable file system interface for Linux. In LinuxExpo 99, May 1999.
-
(1999)
LinuxExpo 99
-
-
Zadok, E.1
Badulescu, I.2
|