-
2
-
-
33746389745
-
-
CERT Coordination Center
-
CERT: Advisory CA-2001-21: Buffer overflow in telnetd. CERT Coordination Center (2001)
-
(2001)
Buffer Overflow in Telnetd
-
-
-
4
-
-
33846294027
-
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
-
To appear
-
Liang, Z., Sekar, R.: Automatic generation of buffer overflow attack signatures: An approach based on program behavior models. In: Proc. ACSAC. (2005) To appear.
-
(2005)
Proc. ACSAC
-
-
Liang, Z.1
Sekar, R.2
-
5
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Proc. RAID. (2005)
-
(2005)
Proc. RAID
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
6
-
-
35048883095
-
A model for the semantics of attack signatures in misuse detection systems
-
Meier, M.: A model for the semantics of attack signatures in misuse detection systems. In: Proc. ISC. (2004) 158-169
-
(2004)
Proc. ISC
, pp. 158-169
-
-
Meier, M.1
-
7
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
Eckmann, S., Vigna, G., Kemmerer, R.: STATL: An attack language for state-based intrusion detection. Journal of Computer Security 10(1/2) (2002) 71-104
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
8
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: a system for detecting network intruders in real-time. In: Proc. USENIX. (1998) 31-51
-
(1998)
Proc. USENIX
, pp. 31-51
-
-
Paxson, V.1
-
9
-
-
33750351545
-
Anomalous payload-based worm detection and signature generation
-
Wang, K., Cretu, G., Stolfo, S.: Anomalous payload-based worm detection and signature generation. In: Proc. RAID. (2005)
-
(2005)
Proc. RAID
-
-
Wang, K.1
Cretu, G.2
Stolfo, S.3
-
10
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In: Proc. RAID. (2004) 203-222
-
(2004)
Proc. RAID
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.2
-
12
-
-
10844237614
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Mahoney, M., Chan, P.: An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: Proc. RAID. (2004) 220-237
-
(2004)
Proc. RAID
, pp. 220-237
-
-
Mahoney, M.1
Chan, P.2
-
13
-
-
0141441130
-
PHAD: Packet header anomaly detection for identifying hostile network traffic
-
Florida Institute of Technology
-
Mahoney, M., Chan, P.: PHAD: Packet header anomaly detection for identifying hostile network traffic. Technical Report CS-2001-2, Florida Institute of Technology (2001)
-
(2001)
Technical Report
, vol.CS-2001-2
-
-
Mahoney, M.1
Chan, P.2
-
14
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Kluwer
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security. Kluwer (2002)
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
15
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3 (2001) 227-261
-
(2001)
ACM Transactions on Information and System Security
, vol.3
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
16
-
-
23544449776
-
Learning models of network traffic for detecting novel attacks
-
Florida Institute of Technology
-
Mahoney, M., Chan, P.: Learning models of network traffic for detecting novel attacks. Technical Report CS-2002-8, Florida Institute of Technology (2002)
-
(2002)
Technical Report
, vol.CS-2002-8
-
-
Mahoney, M.1
Chan, P.2
-
17
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
Mahoney, M.: Network traffic anomaly detection based on packet bytes. In: Proc. ACM Symposium on Applied Computing. (2003) 346-350
-
(2003)
Proc. ACM Symposium on Applied Computing
, pp. 346-350
-
-
Mahoney, M.1
-
19
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA, USA
-
Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for unix processes. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA (1996) 120-128
-
(1996)
Proc. IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
20
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6(3) (1998) 151-180
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
22
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length n-grams
-
Marceau, C.: Characterizing the behavior of a program using multiple-length n-grams. In: Proc. NSPW. (2000) 101-110
-
(2000)
Proc. NSPW
, pp. 101-110
-
-
Marceau, C.1
-
23
-
-
0002365658
-
Learning program behavior profiles for intrusion detection
-
Santa Clara, CA, USA
-
Ghosh, A., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proc. USENIX, Santa Clara, CA, USA (1999) 51-62
-
(1999)
Proc. USENIX
, pp. 51-62
-
-
Ghosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
24
-
-
84964540406
-
Modeling system calls for intrusion detection with dynamic window sizes
-
Eskin, E., Lee, W., Stolfo, S.: Modeling system calls for intrusion detection with dynamic window sizes. In: Proc. DISCEX. (2001)
-
(2001)
Proc. DISCEX
-
-
Eskin, E.1
Lee, W.2
Stolfo, S.3
-
25
-
-
0028911698
-
Gauging similarity with n-grams: Language-independent categorization of text
-
Damashek, M.: Gauging similarity with n-grams: Language-independent categorization of text. Science 267(5199) (1995) 843-848
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
27
-
-
84945709825
-
Trie memory
-
Fredkin, E.: Trie memory. Communications of ACM 3(9) (1960) 490-499
-
(1960)
Communications of ACM
, vol.3
, Issue.9
, pp. 490-499
-
-
Fredkin, E.1
-
29
-
-
33746426241
-
Robustness of canberra metric in computer intrusion detection
-
West Point, NY, USA
-
Emran, S., Ye, N.: Robustness of canberra metric in computer intrusion detection. In: Proc. IEEE Workshop on Information Assurance and Security, West Point, NY, USA (2001)
-
(2001)
Proc. IEEE Workshop on Information Assurance and Security
-
-
Emran, S.1
Ye, N.2
-
30
-
-
0000250265
-
Measure of the amount of ecologic association between species
-
Dice, L.: Measure of the amount of ecologic association between species. Ecology 26(3) (1945) 297-302
-
(1945)
Ecology
, vol.26
, Issue.3
, pp. 297-302
-
-
Dice, L.1
-
31
-
-
0003608557
-
-
Freeman, San Francisco, CA, USA
-
Sokal, R., Sneath, P.: Principles of numerical taxonomy. Freeman, San Francisco, CA, USA (1963)
-
(1963)
Principles of Numerical Taxonomy
-
-
Sokal, R.1
Sneath, P.2
-
33
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection,. In: Proc. SIAM. (2003)
-
(2003)
Proc. SIAM
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
34
-
-
85016684916
-
Intrusion detection in unlabeled data with quarter-sphere support vector machines
-
Laskov, P., Schäfer, C., Kotenko, I.: Intrusion detection in unlabeled data with quarter-sphere support vector machines. In: Proc. DIMVA. (2004) 71-82
-
(2004)
Proc. DIMVA
, pp. 71-82
-
-
Laskov, P.1
Schäfer, C.2
Kotenko, I.3
-
35
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34(4) (2000) 579-595
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
36
-
-
0242445762
-
The 1998 Lincoln Laboratory IDS evaluation
-
McHugh, J.: The 1998 Lincoln Laboratory IDS evaluation. In: Proc. RAID. (2000) 145-161
-
(2000)
Proc. RAID
, pp. 145-161
-
-
McHugh, J.1
-
37
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. on Information Systems Security 3(4) (2000) 262-294
-
(2000)
ACM Trans. on Information Systems Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
39
-
-
0041965869
-
Text classification using string kernels
-
Lodhi, H., Saunders, C., Shawe-Taylor, J., Cristianini, N., Watkins, C.: Text classification using string kernels. Journal of Machine Learning Research 2 (2002) 419-444
-
(2002)
Journal of Machine Learning Research
, vol.2
, pp. 419-444
-
-
Lodhi, H.1
Saunders, C.2
Shawe-Taylor, J.3
Cristianini, N.4
Watkins, C.5
-
40
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proc. LISA. (1999) 229-238
-
(1999)
Proc. LISA
, pp. 229-238
-
-
Roesch, M.1
-
42
-
-
0017952955
-
N-gram statistics for natural language understanding and text processing
-
Suen, C.Y.: N-gram statistics for natural language understanding and text processing. IEEE Trans. Pattern Analysis and Machine Intelligence 1(2) (1979) 164-172
-
(1979)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.1
, Issue.2
, pp. 164-172
-
-
Suen, C.Y.1
-
43
-
-
0002636321
-
N-gram-based text categorization
-
Las Vegas, NV, USA
-
Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proc. SDAIR, Las Vegas, NV, USA. (1994) 161-175
-
(1994)
Proc. SDAIR
, pp. 161-175
-
-
Cavnar, W.B.1
Trenkle, J.M.2
-
44
-
-
0032405150
-
Applications of n-grams in textual information systems
-
Robertson, A.M., Willett, P.: Applications of n-grams in textual information systems. Journal of Documentation 58(1) (1998) 48-69
-
(1998)
Journal of Documentation
, vol.58
, Issue.1
, pp. 48-69
-
-
Robertson, A.M.1
Willett, P.2
-
45
-
-
0002531715
-
Dynamic alignment kernels
-
Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D., eds., Cambridge, MA, MIT Press
-
Watkins, C.: Dynamic alignment kernels. In Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D., eds.: Advances in Large Margin Classifiers, Cambridge, MA, MIT Press (2000) 39-50
-
(2000)
Advances in Large Margin Classifiers
, pp. 39-50
-
-
Watkins, C.1
-
46
-
-
0036358995
-
The spectrum kernel: A string kernel for SVM protein classification
-
Leslie, C., Eskin, E., Noble, W.: The spectrum kernel: A string kernel for SVM protein classification. In: Proc. Pacific Symp. Biocomputing. (2002) 564-575
-
(2002)
Proc. Pacific Symp. Biocomputing
, pp. 564-575
-
-
Leslie, C.1
Eskin, E.2
Noble, W.3
-
47
-
-
0002774999
-
Learning patterns from unix process execution traces for intrusion detection
-
Providence, RI, USA
-
Lee, W., Stolfo, S., Chan, P.: Learning patterns from unix process execution traces for intrusion detection. In: Proc. AAAI workshop on Fraud Detection and Risk Management, Providence, RI, USA (1997) 50-56
-
(1997)
Proc. AAAI Workshop on Fraud Detection and Risk Management
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
-
48
-
-
84942248748
-
Finding the vocabulary of program behavior data for anomaly detection
-
Michael, C.: Finding the vocabulary of program behavior data for anomaly detection. In: Proc. DISCEX. (2003) 152-163
-
(2003)
Proc. DISCEX
, pp. 152-163
-
-
Michael, C.1
-
49
-
-
84943817322
-
Error-detecting and error-correcting codes
-
Hamming, R.W.: Error-detecting and error-correcting codes. Bell System Technical Journal 29(2) (1950) 147-160
-
(1950)
Bell System Technical Journal
, vol.29
, Issue.2
, pp. 147-160
-
-
Hamming, R.W.1
-
50
-
-
0004292021
-
-
Academic Press, Inc., New York, NY, USA
-
Anderberg, M.: Cluster Analysis for Applications. Academic Press, Inc., New York, NY, USA (1973)
-
(1973)
Cluster Analysis for Applications
-
-
Anderberg, M.1
-
51
-
-
33745215847
-
From outliers to prototypes: Ordering data
-
in press
-
Harmeling, S., Dornhege, G., Tax, D., Meinecke, F., Müller, K.R.: From outliers to prototypes: ordering data. Neurocomputing (2006) in press.
-
(2006)
Neurocomputing
-
-
Harmeling, S.1
Dornhege, G.2
Tax, D.3
Meinecke, F.4
Müller, K.R.5
|