-
1
-
-
0006888659
-
Safeguard final report: Detecting unusual program behavior using the NIDES statistical component
-
Computer Science Laboratory, SRI International, Menlo Park, CA, USA
-
ANDERSON, D., LUNT, T. F., JAVITZ, H., TAMAHU, A., AND VALDES, A. 1993. SAFEGUARD FINAL REPORT: Detecting unusual program behavior using the NIDES statistical component, Tech. Rep., Computer Science Laboratory, SRI International, Menlo Park, CA, USA.
-
(1993)
Tech. Rep.
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamahu, A.4
Valdes, A.5
-
3
-
-
0003227185
-
Security architecture for the Internet protocol
-
ATKINSON, R. 1995. Security architecture for the Internet protocol. Internet RFC 1825.
-
(1995)
Internet RFC
, vol.1825
-
-
Atkinson, R.1
-
5
-
-
84867854789
-
REMUS: A security-enhanced operating system
-
BERNASCHI, M., GABRIELLI, E., AND MANCINI, L. V. 2002. REMUS: A security-enhanced operating system. ACM Trans. Inf. Syst. Sec. 5, 1 (February).
-
(2002)
ACM Trans. Inf. Syst. Sec.
, vol.5
, Issue.1 FEBRUARY
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
6
-
-
0030092390
-
Checking for race conditions in file accesses
-
BISHOP, M. AND DILGER, M. 1996. Checking for race conditions in file accesses. Computing Syst. 9, 2, 131-152.
-
(1996)
Computing Syst.
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
8
-
-
10044275460
-
SubDomain: Parsimonious server security
-
COWAN, C., BEATTIE, S., KROAH-HARTMAN, G., PU, C., WAGGLE, P., AND GLIGOR, V. 2000. SubDomain: Parsimonious server security. In Proceedings of the 14th Systems Administration Conference (LISA 2000).
-
(2000)
Proceedings of the 14th Systems Administration Conference (LISA 2000)
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Waggle, P.5
Gligor, V.6
-
9
-
-
0004135984
-
IDIOT users guide
-
COAST Laboratory, Dept. of Computer Sciences, Purdue University
-
CROSBIE, M., DOLE, B., ELLIS, T., KRSUL, I., AND SPAFFORD, E. 1996. IDIOT users guide. Tech. Report CSD-TR-96-050, COAST Laboratory, Dept. of Computer Sciences, Purdue University.
-
(1996)
Tech. Report
, vol.CSD-TR-96-050
-
-
Crosbie, M.1
Dole, B.2
Ellis, T.3
Krsul, I.4
Spafford, E.5
-
10
-
-
3142581492
-
Fixed vs. variable-length patterns for detecting suspicious process behavior
-
IBM Research Division, Zurich Research Lab.
-
DEBAR, H., DACIER, M., NASSEHI, M., AND WESPI, A. 1998. Fixed vs. variable-length patterns for detecting suspicious process behavior. Research Report, No. RZ3012, IBM Research Division, Zurich Research Lab.
-
(1998)
Research Report, No. RZ3012
, vol.RZ3012
-
-
Debar, H.1
Dacier, M.2
Nassehi, M.3
Wespi, A.4
-
11
-
-
0033293396
-
Towars a taxonomy of intrusion detection systems
-
DEBAR, H., DACIER, M., AND WESPI, A. 1999. Towars a taxonomy of intrusion detection systems. Computer Networks 31.
-
(1999)
Computer Networks
, vol.31
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
15
-
-
0029716418
-
A sense of self for UNIX processes
-
FORREST, S., HOFMEYR, S. A., SOMAYAJI, A., AND LONGSTAFF, T. A. 1996. A Sense of self for UNIX processes. In IEEE Symposium on Security and Privacy.
-
(1996)
IEEE Symposium on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
18
-
-
3142543303
-
Intrusion detection system (IDS) product review
-
IBM Research Division, Zurich Research Lab.
-
JACKSON, K. A. 1999. Intrusion Detection System (IDS) product review. IBM internal confidential document, IBM Research Division, Zurich Research Lab.
-
(1999)
IBM Internal Confidential Document
-
-
Jackson, K.A.1
-
20
-
-
0004118981
-
The NIDES statistical component description and justification
-
Computer Science Laboratory, SRI International, Menlo Park, Cal., USA
-
JAVITZ, H. AND VALDES, A. 1994. The NIDES statistical component description and justification. Tech. Rep., Computer Science Laboratory, SRI International, Menlo Park, Cal., USA.
-
(1994)
Tech. Rep.
-
-
Javitz, H.1
Valdes, A.2
-
22
-
-
85084160041
-
Detecting and countering system intrusions using software wrappers
-
KO, C., FRASER, T., BADGER, L., AND KILPATRICK, D. 2000. Detecting and countering system intrusions using software wrappers. In Proceedings of the 9th USENIX Security Symposium.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Ko, C.1
Fraser, T.2
Badger, L.3
Kilpatrick, D.4
-
23
-
-
3142582037
-
Networking implementation notes, 4.3BSD edition
-
USENIX Association
-
LEFFLĖR, S. J., JOY, W. N., FARBY, R. S., AND KAREL, M. J. 1986. Networking implementation notes, 4.3BSD edition. In UNIX System Manager's Manual, 4.3 Berkeley Software Distribution, Virtual VAX-11 Edition. USENIX Association.
-
(1986)
UNIX System Manager's Manual, 4.3 Berkeley Software Distribution, Virtual VAX-11 Edition
-
-
Leffler, S.J.1
Joy, W.N.2
Farby, R.S.3
Karel, M.J.4
-
25
-
-
0003972113
-
-
Addison Wesley, New York City, USA
-
McKUSICK, M. K., BOSTIC, K., KARLES, M. J., AND QUARTERMAN, J. S. 1996. The Design and Implementation of the 4.4 BSD Operating System. Addison Wesley, New York City, USA, 67, 540.
-
(1996)
The Design and Implementation of the 4.4 BSD Operating System
, pp. 67
-
-
McKusick, M.K.1
Bostic, K.2
Karles, M.J.3
Quarterman, J.S.4
-
26
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
PAXSON, V. 1998. Bro: A system for detecting network intruders in real-time. In the 7th USENIX Security Symposium.
-
(1998)
The 7th USENIX Security Symposium
-
-
Paxson, V.1
-
28
-
-
80051517712
-
Implementing a generalized tool for network monitoring
-
RANUM, M. J., LANDFIELD, K., STOLARCHUK, M., SIENKIEWICZ, M., LAMETH, A., AND WALL, E. 1997. Implementing a generalized tool for network monitoring. In the 11th USENIX Systems Administrator Conference.
-
(1997)
The 11th USENIX Systems Administrator Conference
-
-
Ranum, M.J.1
Landfield, K.2
Stolarchuk, M.3
Sienkiewicz, M.4
Lameth, A.5
Wall, E.6
-
29
-
-
85084163313
-
Synthesizing fast intrusion detection systems from high-level specifications
-
SEKAR, R. AND UPPULURI, P. 1999. Synthesizing fast intrusion detection systems from high-level specifications. In the 8th USENIX Security Symposium, 63-78.
-
(1999)
The 8th USENIX Security Symposium
, pp. 63-78
-
-
Sekar, R.1
Uppuluri, P.2
-
31
-
-
0242671076
-
Janus: An approach for confinement of untrusted applications
-
University of California at Berkeley
-
WAGNER, D. A. 1999. Janus: An approach for confinement of untrusted applications. Tech. Rep. CSD-99-1056, University of California at Berkeley.
-
(1999)
Tech. Rep.
, vol.CSD-99-1056
-
-
Wagner, D.A.1
-
33
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
WALKER, K. M., STERNE, D. F., BADGER, M. L., PETKAC, M. J., SHERMANN, D. L., AND OOSTENDROP, K. A. 1996. Confining root programs with domain and type enforcement. In the 6th USENIX Security Symposium.
-
(1996)
The 6th USENIX Security Symposium
-
-
Walker, K.M.1
Sterne, D.F.2
Badger, M.L.3
Petkac, M.J.4
Shermann, D.L.5
Oostendrop, K.A.6
|