-
1
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc.
-
Ptacek, T.H., Newsham, T.N.: Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc. (1998)
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
2
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Handley, M., Kreibich, C., Paxson, V.: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In: Proc. 10th USENIX Security Symposium. (2001)
-
(2001)
Proc. 10th USENIX Security Symposium
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
5
-
-
0002067431
-
Netstat: A network-based intrusion detection system
-
Vigna, G., Kemmerer, R.A.: Netstat: A network-based intrusion detection system. Journal of Computer Security 7 (1999) 37-71
-
(1999)
Journal of Computer Security
, vol.7
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
6
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Spafford, E.H., Zamboni, D.: Intrusion Detection Using Autonomous Agents. Computer Networks 34 (2000) 547-570
-
(2000)
Computer Networks
, vol.34
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
7
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31 (1999)
-
(1999)
Computer Networks
, vol.31
-
-
Paxson, V.1
-
8
-
-
0037886264
-
Application-integrated data collection for security monitoring
-
Lecture Notes in Computer Science, Springer-Verlag
-
Almgren, M., Lindqvist, U.: Application-Integrated Data Collection for Security Monitoring. In: Proc. of Recent Advances in Intrusion Detection (RAID). Lecture Notes in Computer Science, Springer-Verlag (2001)
-
(2001)
Proc. of Recent Advances in Intrusion Detection (RAID)
-
-
Almgren, M.1
Lindqvist, U.2
-
9
-
-
26444567950
-
Interfacing trusted applications with intrusion detection systems
-
Lecture Notes in Computer Science, Springer-Verlag
-
Welz, M., Hutchison, A.: Interfacing Trusted Applications with Intrusion Detection Systems. In: Proc. of Recent Advances in Intrusion Detection (RAID). Lecture Notes in Computer Science, Springer-Verlag (2001)
-
(2001)
Proc. of Recent Advances in Intrusion Detection (RAID)
-
-
Welz, M.1
Hutchison, A.2
-
10
-
-
14844305634
-
Exploiting independent state for network intrusion detection
-
TU München
-
Sommer, R., Paxson, V.: Exploiting Independent State For Network Intrusion Detection. Technical Report TUM-I0420, TU München (2004)
-
(2004)
Technical Report
, vol.TUM-I0420
-
-
Sommer, R.1
Paxson, V.2
-
13
-
-
84861264923
-
-
Broccoli: The Bro Client Communications Library
-
Broccoli: The Bro Client Communications Library. http://www.cl. cam.ac.uk/~cpk25/broccoli/
-
-
-
-
16
-
-
21244454934
-
Uniform Resource Identifiers (URI): Generic syntax (1998)
-
Berners-Lee, T., Fielding, R., Irvine, U., Masinter, L. Uniform Resource Identifiers (URI): Generic Syntax (1998) RFC 2396.
-
RFC
, vol.2396
-
-
Berners-Lee, T.1
Fielding, R.2
Irvine, U.3
Masinter, L.4
-
19
-
-
84861260353
-
-
CVE-2001-0333
-
CVE-2001-0333. http://www.cve.mitre.org/cgi-bin/cvename.cgi? name=CVE-2000-0884 (2001)
-
(2001)
-
-
-
20
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational Experiences with High-Volume Network Intrusion Detection. In: Proc. 11th ACM Conference on Computer and Communications Security. (2004)
-
(2004)
Proc. 11th ACM Conference on Computer and Communications Security
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
21
-
-
84861264924
-
-
libwhisker
-
libwhisker. http://www.wiretrip.net/rfp
-
-
-
-
23
-
-
84861264920
-
-
Nikto. http://www.cirt.net/code/nikto.shtml
-
-
-
-
24
-
-
84861260352
-
-
URL encoder
-
Roelker, D.J. URL encoder. http://code.idsresearch.org/encoder.c
-
-
-
Roelker, D.J.1
|