-
1
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
Seattle, WA, USA, USENIX Assoc.
-
M. Roesch: Snort - Lightweight Intrusion Detection for Networks. In: Proc. of the 13th System Administration Conference (LISA 1999), Seattle, WA, USA, pp. 229-238., USENIX Assoc., 1999.
-
(1999)
Proc. of the 13th System Administration Conference (LISA 1999)
, pp. 229-238
-
-
Roesch, M.1
-
2
-
-
85037721353
-
Netflow services and applications
-
15 Jul.
-
Cisco Systems Inc.: NetFlow Services and Applications. White Paper. 15 Jul. 2002, http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/ napps_wp.htm
-
(2002)
White Paper
-
-
-
3
-
-
26444582427
-
Set, bags and rock and roll - Analyzing large datasets of network data
-
P. Samarati; D. Gollmann; R. Molva (eds.): Computer Security - ESORICS 2004, Proc. of the 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, Springer Verlag
-
J. McHugh: Set, Bags and Rock and Roll - Analyzing Large Datasets of Network Data. In: P. Samarati; D. Gollmann; R. Molva (eds.): Computer Security - ESORICS 2004, Proc. of the 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, LNCS 3193, pp. 407-422, Springer Verlag, 2004.
-
(2004)
LNCS
, vol.3193
, pp. 407-422
-
-
McHugh, J.1
-
5
-
-
35248819234
-
Using decision trees to improve signature-based intrusion detection
-
Proc. of the 6th Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, USA, Springer Verlag
-
C. Kruegel, T. Toth: Using Decision Trees to Improve Signature-based Intrusion Detection In: Proc. of the 6th Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, USA, LNCS 2820, pp. 173-191, Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2820
, pp. 173-191
-
-
Kruegel, C.1
Toth, T.2
-
6
-
-
84904280510
-
E2xB: A domain specific string matching algorithm for intrusion detection
-
Kluwer Academic Publishing
-
K. G. Anagnostakis, E. P. Markatos, S. Antonatos, and M. Polychronakis. E2xB: A domain specific string matching algorithm for intrusion detection. In Proc. of the 18th IFIP International Information Security Conference (SEC2003), pp. 217-228, Kluwer Academic Publishing, 2003.
-
(2003)
Proc. of the 18th IFIP International Information Security Conference (SEC2003)
, pp. 217-228
-
-
Anagnostakis, K.G.1
Markatos, E.P.2
Antonatos, S.3
Polychronakis, M.4
-
7
-
-
35048883095
-
A model for the semantics of attack signatures in misuse detection systems
-
Proc. of 7th Information Security Conference (ISC 2004), Palo Alto, CA, USA, Springer
-
M. Meier: A Model for the Semantics of Attack Signatures in Misuse Detection Systems. In: Proc. of 7th Information Security Conference (ISC 2004), Palo Alto, CA, USA, LNCS 3225, pp. 158-169, Springer, 2004.
-
(2004)
LNCS
, vol.3225
, pp. 158-169
-
-
Meier, M.1
-
8
-
-
26444469653
-
Towards a scalable approach to tailoring the disclosure of pseudonymous audit data to misuse detection signatures
-
U. Flegel, M. Meier: Towards a Scalable Approach to Tailoring the Disclosure of Pseudonymous Audit Data to Misuse Detection Signatures. Internal discussion paper, 2002.
-
(2002)
Internal Discussion Paper
-
-
Flegel, U.1
Meier, M.2
-
9
-
-
26444475597
-
-
Diploma Thesis, Chair Computer Networks and Communication Systems, Brandenburg University of Technology, Cottbus, Germany
-
S. Schmerl: Entwurf und Entwicklung einer effizienten Analyseeinheit für Intrusion-Detection-Systeme (in German). Diploma Thesis, Chair Computer Networks and Communication Systems, Brandenburg University of Technology, Cottbus, Germany, 2004.
-
(2004)
Entwurf und Entwicklung Einer Effizienten Analyseeinheit für Intrusion-detection-systeme (in German)
-
-
Schmerl, S.1
-
10
-
-
84860434876
-
The STAT tool suite
-
IEEE Press, Hilton Head
-
G. Vigna, S.T. Eckmann, R.A. Kemmerer: The STAT Tool Suite. In: Proc. of DARPA Information Survivability Conference and Exposition (DISCEX) 2000, Vol. 2, pp. 46-55, IEEE Press, Hilton Head, 2000.
-
(2000)
Proc. of DARPA Information Survivability Conference and Exposition (DISCEX) 2000
, vol.2
, pp. 46-55
-
-
Vigna, G.1
Eckmann, S.T.2
Kemmerer, R.A.3
-
11
-
-
0003518833
-
-
PhD Thesis, Dept. of Computer Science, Purdue University, West Lafayette, IN, August
-
S. Kumar: Classification and Detection of Computer Intrusions. PhD Thesis, Dept. of Computer Science, Purdue University, West Lafayette, IN, August 1995.
-
(1995)
Classification and Detection of Computer Intrusions
-
-
Kumar, S.1
-
12
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
IOS Press, Amsterdam, ISSN 0926-227X
-
S.T. Eckmann, G. Vigna, R.A. Kemmerer: STATL: An Attack Language for State-based Intrusion Detection. In: Journal of Computer Security, vol. 10, no. 1/2, pp. 71-104, IOS Press, Amsterdam, 2002, ISSN 0926-227X.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
14
-
-
85095970245
-
Experience with EMERALD to date
-
Santa Clara, California, USA
-
P. G. Neumann; A. Ph. Porras: Experience with EMERALD to Date. In: Proc. of the First USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, pp. 73 - 80, 1999.
-
(1999)
Proc. of the First USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.G.1
Porras, A.Ph.2
-
15
-
-
0028711786
-
Audit reduction and misuse detection in heterogeneous environments: Framework and application
-
Orlando, FL
-
P. E. Proctor: Audit reduction and misuse detection in heterogeneous environments: Framework and application. In: Proc. of the 10th Annual Computer Security Applications Conference, Orlando, FL, pp. 117 - 125, 1994.
-
(1994)
Proc. of the 10th Annual Computer Security Applications Conference
, pp. 117-125
-
-
Proctor, P.E.1
-
16
-
-
0037907453
-
The Intrusion Detection system AID. Architecture, and experiences in automated audit analysis
-
Essen, Germany, Chapman & Hall, London
-
M. Sobirey, B. Richter; H. König: The Intrusion Detection System AID. Architecture, and experiences in automated audit analysis. In: Proc. of the IFIP TC6/TC11 Conference on Communications and Multimedia Security, Essen, Germany, pp. 278-290, Chapman & Hall, London, 1996.
-
(1996)
Proc. of the IFIP TC6/TC11 Conference on Communications and Multimedia Security
, pp. 278-290
-
-
Sobirey, M.1
Richter, B.2
König, H.3
-
17
-
-
0032630098
-
Detecting computer and network misuse through the Production-Based Expert System Toolset (P-BEST)
-
Los Alamitos, CA, IEEE Press
-
U. Lindqvist; P. A. Porras: Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In: Proc. of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, pp. 146-161, IEEE Press, 1999.
-
(1999)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
19
-
-
48649092087
-
RTie inference engine
-
TALARIAN CORPORATION (eds.). Mountain View, Ca, USA
-
TALARIAN CORPORATION: RTie Inference Engine. In: TALARIAN CORPORATION (eds.): RTworks 3.5. Mountain View, Ca, USA, 1995.
-
(1995)
RTworks 3.5
-
-
-
20
-
-
26444600922
-
-
Student Research Thesis, Chair Computer Networks and Communication Systems, Brandenburg University of Technology, Cottbus, Germany
-
R. Krauz: Implementierung eines auf dem Expertensystem-Tool CLIPS basierenden Intrusion Detection Systems (in German). Student Research Thesis, Chair Computer Networks and Communication Systems, Brandenburg University of Technology, Cottbus, Germany, 2004.
-
(2004)
Implementierung Eines auf Dem Expertensystem-tool CLIPS Basierenden Intrusion Detection Systems (in German)
-
-
Krauz, R.1
-
21
-
-
0020177941
-
Rete: A fast algorithm for the many pattern/many object pattern match problem
-
1982
-
C. L. Forgy: Rete: A Fast Algorithm for the Many Pattern/Many Object Pattern Match Problem. In: Artificial Intelligence, 19 (1982) 10, pp. 17-37, 1982.
-
(1982)
Artificial Intelligence
, vol.19
, Issue.10
, pp. 17-37
-
-
Forgy, C.L.1
|