-
1
-
-
0141723181
-
-
Kdd cup 1999 data. Available at http://kdd.ics.uci.edu/databases/ kddcup99/, 2006.
-
Kdd Cup 1999 Data
-
-
-
2
-
-
2442424268
-
Naive bayes vs decision trees in intrusion detection systems
-
Nahla Ben Amor, Salem Benferhat, and Zied Elouedi. Naive bayes vs decision trees in intrusion detection systems. In SAC '04, 2004.
-
(2004)
SAC '04
-
-
Amor, N.B.1
Benferhat, S.2
Elouedi, Z.3
-
3
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
November
-
S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of ACM CCS'1999, November 1999.
-
(1999)
Proceedings of ACM CCS'1999
-
-
Axelsson, S.1
-
4
-
-
0003524305
-
A preliminary attempt to apply detection and estimation theory to intrusion detection
-
Dept. of Computer Engineering, Chalmers Univerity of Technology, Sweden, March
-
Stefan Axelsson. A preliminary attempt to apply detection and estimation theory to intrusion detection. Technical Report 00-4, Dept. of Computer Engineering, Chalmers Univerity of Technology, Sweden, March 2000.
-
(2000)
Technical Report 00-4
-
-
Axelsson, S.1
-
5
-
-
33751035185
-
A framework for the evaluation of intrusion detection systems
-
Oakland, California, May
-
Alvaro Cardenas, Karl Seamon, and John Baras. A Framework for the Evaluation of Intrusion Detection Systems. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, Oakland, California, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Cardenas, A.1
Seamon, K.2
Baras, J.3
-
8
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Herve' Debar, Marc Dacier, and Andreas Wespi. Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8):805-822, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
10
-
-
34247332710
-
Measuring intrusion detection capability: An information-theoretic approach
-
March
-
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skoric. Measuring intrusion detection capability: An information-theoretic approach. In Proceedings of ACM Symposium on InformAction, Computer and Communications Security (ASIACCS'06), March 2006.
-
(2006)
Proceedings of ACM Symposium on InformAction, Computer and Communications Security (ASIACCS'06)
-
-
Gu, O.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
11
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Mark Handley, Vern Paxson, and Christian Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security Symposium 2001, 2001.
-
(2001)
Proc. USENIX Security Symposium 2001
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
12
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
September
-
P. Helman and G. Liepins. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering, 19(9), September 1993.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
-
-
Helman, P.1
Liepins, G.2
-
14
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Hyang-Ah Kim and Brad Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security Symposium, pages 271-286, 2004.
-
(2004)
USENIX Security Symposium
, pp. 271-286
-
-
Kim, H.-A.1
Karp, B.2
-
15
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
Anukool Lakhina, Mark Crovella, and Christophe Diot. Mining anomalies using traffic feature distributions. In SIGCOMM '05, 2005.
-
(2005)
SIGCOMM '05
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
17
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Wenke Lee and Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):p.227-261, 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
20
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory
-
November
-
John McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory. ACM Transactions on Information and System Security, 3(4), November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
22
-
-
33745772237
-
Polygraph: Automatically generating signatures for polymorphic worms
-
James Newsome, Brad Karp, and Dawn Song. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE S&P '05, 2005.
-
(2005)
IEEE S&P '05
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
23
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
Vern Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, December 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
24
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks Inc., January
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
25
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, and Ronald A. Olsson. A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering, 22(10):719-729, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
26
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
M. Roesch. Snort - lightweight intrusion detection for networks. In Proceedings of USENIX LISA'99, 1999.
-
(1999)
Proceedings of USENIX LISA'99
-
-
Roesch, M.1
-
27
-
-
14844324904
-
Enhancing byte-level network intrusion detection signatures with context
-
Robin Sommer and Vern Paxson. Enhancing byte-level network intrusion detection signatures with context. In CCS '03, 2003.
-
(2003)
CCS '03
-
-
Sommer, R.1
Paxson, V.2
-
28
-
-
33750259666
-
Formal reasoning about intrusion detection systems
-
September
-
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, and Karl N. Levitt. Formal reasoning about intrusion detection systems. In Proceedings of RAID'2004, September 2004.
-
(2004)
Proceedings of RAID'2004
-
-
Song, T.1
Ko, C.2
Alves-Foss, J.3
Zhang, C.4
Levitt, K.N.5
-
29
-
-
84941148984
-
-
Sullo. Nikto, 2006. Available at http://www.cirt.net/code/nikto.shtml.
-
(2006)
-
-
-
31
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
September
-
Ke Wang and Salvatore J. Stolfo. Anomalous payload-based network intrusion detection. In Proceedings of RAID'2004, September 2004.
-
(2004)
Proceedings of RAID'2004
-
-
Wang, K.1
Stolfo, S.J.2
|