-
1
-
-
0004145058
-
-
Technical report, Secure Networks Inc.
-
Ptacek, T.H., Newsham, T.N.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc. (1998)
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
2
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Washington, D.C., USA
-
Handley, M., Paxson, V., Kreibich, C.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: USENIX-Sec'2001, Washington, D.C., USA (2001)
-
(2001)
USENIX-sec'2001
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
6
-
-
0034449536
-
Implementing a distributed firewall
-
ACM Press
-
loannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M.: Implementing a distributed firewall. In: CCS '00: Proceedings of the 7th ACM conference on Computer and communications security, ACM Press (2000) 190-199
-
(2000)
CCS '00: Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Loannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
8
-
-
33750325871
-
Argos: An emulator for fingerprinting zeroday attacks
-
Leuven, Belgium
-
Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zeroday attacks. In: Proc. ACM SIGOPS EUROSYS'2006, Leuven, Belgium (2006)
-
(2006)
Proc. ACM SIGOPS EUROSYS'2006
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
10
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of bufferoverflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle and Q. Zhang: StackGuard: Automatic adaptive detection and prevention of bufferoverflow attacks. In: Proc. of the 7th USENIX Security Symposium. (1998)
-
(1998)
Proc. of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
11
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D.C. Du Varney and R. Sekar: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: In Proc. of the 12th USENIX Security Symposium. (2003) 105-120
-
(2003)
Proc. of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
Du Varney, D.C.2
Sekar, R.3
-
12
-
-
18744376889
-
Randomized instruction set emulation to disrupt code injection attacks
-
E. G. Barrantes, D.H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovix and D.D. Zovi: Randomized instruction set emulation to disrupt code injection attacks. In: In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS). (2003) 281-289
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovix, D.5
Zovi, D.D.6
-
13
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Brighton, UK
-
M. Costa, J. Crowcroft, M. Castro, A Rowstron, L. Zhou, L. Zhang and P. Barham: Vigilante: End-to-end containment of internet worms. In: In Proc. of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK (2005)
-
(2005)
Proc. of the 20th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
14
-
-
8844253507
-
A hardware platform for network intrusion detection and prevention
-
Madrid, Spain
-
Clark, C., Lee, W., Schimmel, D., Contis, D., Koné, M., Thomas, A.: A hardware platform for network intrusion detection and prevention. In: Third Workshop on Network Processors and Applications, Madrid, Spain (2004)
-
(2004)
Third Workshop on Network Processors and Applications
-
-
Clark, C.1
Lee, W.2
Schimmel, D.3
Contis, D.4
Koné, M.5
Thomas, A.6
-
15
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Las Vegas, Nevada
-
Williamson, M.M.: Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In: Proc. of ACSAC Security Conference, Las Vegas, Nevada (2002)
-
(2002)
Proc. of ACSAC Security Conference
-
-
Williamson, M.M.1
-
16
-
-
70349144635
-
Using generalization and characterization techniques in the anomaly-based detection of web attacks
-
Robertson, W., Vigna, G., Kruegel, C., Kemmerer, R.: Using generalization and characterization techniques in the anomaly-based detection of web attacks. In: NDSS'05. (2005)
-
(2005)
NDSS'05
-
-
Robertson, W.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
-
22
-
-
17644393012
-
Bypassing stackguard and stackshield
-
bulba and Kil3r
-
bulba and Kil3r: Bypassing Stackguard and Stackshield. Phrack Magazine 10 (2000)
-
(2000)
Phrack Magazine
, vol.10
-
-
-
23
-
-
34748842480
-
Advances in format string exploitation
-
gera, riq
-
gera, riq: Advances in format string exploitation. Phrack Magazine 11 (2002)
-
(2002)
Phrack Magazine
, vol.11
-
-
-
24
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Alexandria, VA, USA
-
Liang, Z., Sekar, R.: Fast and automated generation of attack signatures: A basis for building self-protecting servers. In: Proc. ACM CCS, Alexandria, VA, USA (2005) 213-223
-
(2005)
Proc. ACM CCS
, pp. 213-223
-
-
Liang, Z.1
Sekar, R.2
-
25
-
-
33746389292
-
Polymorphic worm detection using structural information of executables
-
Seattle, USA
-
Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Proc. of RAID'05, Seattle, USA (2005)
-
(2005)
Proc. of RAID'05
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
26
-
-
0009014466
-
-
Technical report, Purdue University
-
Kerschbaum, F., Spafford, E.H., Zamboni, D.: Using embedded sensors for detecting network attack. Technical report, Purdue University (2000)
-
(2000)
Using Embedded Sensors for Detecting Network Attack
-
-
Kerschbaum, F.1
Spafford, E.H.2
Zamboni, D.3
-
27
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks 31(23-24) (1999) 2435-2463
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
28
-
-
79961204066
-
FFPF: Fairly fast packet filters
-
San Francisco, CA
-
Bos, H., de Bruijn, W., Cristea, M., Nguyen, T., Portokalidis, G.: FFPF: Fairly Fast Packet Filters. In: Proceedings of OSDI'04, San Francisco, CA (2004)
-
(2004)
Proceedings of OSDI'04
-
-
Bos, H.1
De Bruijn, W.2
Cristea, M.3
Nguyen, T.4
Portokalidis, G.5
-
29
-
-
24944498220
-
Fpl-3: Towards language support for distributed packet processing
-
Proceedings of IFIP Networking, published as ISBN: 3-540-25809-4, Waterloo, Ontario, Canada
-
Cristea, M., de Bruijn, W., Bos, H.: Fpl-3: towards language support for distributed packet processing. In: Proceedings of IFIP Networking, published as LNCS Volume 3462 / 2005, ISBN: 3-540-25809-4, Waterloo, Ontario, Canada (2005) p.743-755
-
(2005)
LNCS Volume 3462 / 2005
, pp. 743-755
-
-
Cristea, M.1
De Bruijn, W.2
Bos, H.3
-
30
-
-
0033890508
-
Transport and application protocol scrubbing
-
Tel-Aviv, Israel
-
Malan, R., Watson, D., Jahanian, F., Howell, P.: Transport and application protocol scrubbing. In: Infocom'2000, Tel-Aviv, Israel (2000)
-
(2000)
Infocom'2000
-
-
Malan, R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
31
-
-
84964467051
-
NFAs with tagged transitions, their conversion to deterministic automata and application to regular expressions
-
Laurikari, V.: NFAs with tagged transitions, their conversion to deterministic automata and application to regular expressions. In: SPIRE. (2000) 181-187
-
(2000)
SPIRE
, pp. 181-187
-
-
Laurikari, V.1
-
36
-
-
28844450371
-
Scalable network monitors for high-speed links: A bottom-up approach
-
Nguyen, T., Cristea, M., de Bruijn, W., Box, H.: Scalable network monitors for high-speed links: a bottom-up approach. In: Proceedings of IPOM'04. (2004)
-
(2004)
Proceedings of IPOM'04
-
-
Nguyen, T.1
Cristea, M.2
De Bruijn, W.3
Box, H.4
|