-
1
-
-
0025603636
-
A policy model for denial of service
-
Franconia, NH USA, June. IEEE Computer Society Press
-
E. Amoroso. A policy model for denial of service. In Proceedings of the Computer Security Foundations Workshop III, pages 110-997, Franconia, NH USA, June 1990. IEEE Computer Society Press.
-
(1990)
Proceedings of the Computer Security Foundations Workshop III
, pp. 110-997
-
-
Amoroso, E.1
-
2
-
-
33745467790
-
Towards a third generation data capture architecture for honeynets
-
United States Military Academy, West Point, NY, USA, June 15-17. IEEE Computer Society Press
-
E. Balas and C. Viecco. Towards a third generation data capture architecture for honeynets. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pages 110-997, United States Military Academy, West Point, NY, USA, June 15-17 2005. IEEE Computer Society Press.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
, pp. 110-997
-
-
Balas, E.1
Viecco, C.2
-
3
-
-
84962259930
-
Building survivable systems: An integrated approach based on intrusion detection and damage containment
-
II
-
T. Bowen, D. Chee, and M. Segal. Building survivable systems: An integrated approach based on intrusion detection and damage containment. In IEEE Proceedings of the DARPA Information Survivability Conference and Exposition, volume II of II, pages 84-999, 2000.
-
(2000)
IEEE Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 84-999
-
-
Bowen, T.1
Chee, D.2
Segal, M.3
-
5
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
July
-
J. Crampton and G. Loizou. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System Security, 6(2):201-231, July 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.2
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
8
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
volume 2212 of Lecture Notes in Computer Science. Springer-Verlag
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection(RAID2001), volume 2212 of Lecture Notes in Computer Science, pages 85-103. Springer-Verlag, 2001.
-
(2001)
Recent Advances in Intrusion Detection(RAID2001)
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
9
-
-
33745449214
-
Flow based observations from NETI@home and Honeynet data
-
United States Military Academy, West Point, NY, USA, June 15-17. IEEE Computer Society Press
-
J. B. Grizzard, C. R. Simpson, Jr., S. Krasser, H. L. Owen, and G. F. Riley. Flow based observations from NETI@home and Honeynet data. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, USA, June 15-17 2005. IEEE Computer Society Press.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
-
-
Grizzard, J.B.1
Simpson Jr., C.R.2
Krasser, S.3
Owen, H.L.4
Riley, G.F.5
-
10
-
-
85015336184
-
Intelligent agents for intrusion detection
-
IEEE Computer Society Press
-
G. Helmer, J. Wong, V. Honavar, and L. Miller. Intelligent agents for intrusion detection. In Proceedings of the 2003 IEEE Information Technology Conference, pages 121-124. IEEE Computer Society Press, 1998.
-
(1998)
Proceedings of the 2003 IEEE Information Technology Conference
, pp. 121-124
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
11
-
-
33745434223
-
Detecting honeypots and other suspicious environments
-
United States Military Academy, West Point, NY, USA, June 15-17. IEEE Computer Society Press
-
T. Holz and F. Raynal. Detecting honeypots and other suspicious environments. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, USA, June 15-17 2005. IEEE Computer Society Press.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
-
-
Holz, T.1
Raynal, F.2
-
12
-
-
0003509661
-
-
IANA Network Working Group. Assigned Numbers Authority Network Working Group
-
IANA Network Working Group. RFC1918: Address Allocation for Private Internets, 1996. Assigned Numbers Authority Network Working Group, http://www.rfc-editor.org/rfc/rfcl918.
-
(1996)
RFC1918: Address Allocation for Private Internets
-
-
-
13
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
San Diego, CA, February. Internet Society
-
A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of 1999 Network and Distributed Systems Security Symposium NDSS, pages 151-165, San Diego, CA, February 1999. Internet Society.
-
(1999)
Proceedings of 1999 Network and Distributed Systems Security Symposium NDSS
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
15
-
-
84946398426
-
The use of honeypots to detect exploited systems across large enterprise networks
-
IEEE Computer Society Press
-
J. Levine, R. La Bella, H. Owen, D. Contis, and B. Culver. The use of honeypots to detect exploited systems across large enterprise networks. In Proceedings of the 2003 IEEE Workshop on Information Assurance. IEEE Computer Society Press, 2003.
-
(2003)
Proceedings of the 2003 IEEE Workshop on Information Assurance
-
-
Levine, J.1
La Bella, R.2
Owen, H.3
Contis, D.4
Culver, B.5
-
17
-
-
35248857893
-
An analysis of the 1999 DARPA Lincoln Laboratory evaluation data for network anomaly detection
-
volume 2820 of Lecture Notes in Computer Science. Springer-Verlag
-
M. Mahoney and P. Chan. An analysis of the 1999 DARPA Lincoln Laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection (RAID2003), volume 2820 of Lecture Notes in Computer Science, pages 220-237. Springer-Verlag, 2003.
-
(2003)
Recent Advances in Intrusion Detection (RAID2003)
, pp. 220-237
-
-
Mahoney, M.1
Chan, P.2
-
18
-
-
0034301662
-
A data mining analysis of RTID alarms
-
S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz. A data mining analysis of RTID alarms. Computer Networks: The International. Journal of Computer and Telecommunications Networking, 34:571-577, 2000.
-
(2000)
Computer Networks: The International. Journal of Computer and Telecommunications Networking
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
20
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
volume 2515 of Lecture Notes in Computer Science. Springer-Verlag
-
B. Morin, L. Me, H. Debar, and M. Ducasse. M2D2: A formal data model for IDS alert correlation. In Recent Advances in Intrusion Detection (RAID2002), volume 2515 of Lecture Notes in Computer Science, pages 115-137. Springer-Verlag, 2002.
-
(2002)
Recent Advances in Intrusion Detection (RAID2002)
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
22
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A system for detecting network intruders in real-time. In Computer Networks, volume 31, pages 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
24
-
-
0004145058
-
-
Technical Report, Secure Networks (McAfee) Inc., Santa Clara, California, USA, January
-
T. Ptacek and T. Newsham. Insertion, evasion and denial of service: Eluding network intrusion detection. Technical Report, Secure Networks (McAfee) Inc., Santa Clara, California, USA, January 1998. http://citeseer.ist.psu.edu/ ptacek98insertion.html.
-
(1998)
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.1
Newsham, T.2
-
25
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
Oakland, CA USA, May. IEEE Computer Society Press
-
C. L. Schuba, I. V. Krusl, M. G. Kuhn, E. H. Spaffold, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on TCP. In Proceedings of 1997 IEEE Symposium on Security and Privacy, pages 208-223, Oakland, CA USA, May 1997. IEEE Computer Society Press.
-
(1997)
Proceedings of 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krusl, I.V.2
Kuhn, M.G.3
Spaffold, E.H.4
Sundaram, A.5
Zamboni, D.6
-
26
-
-
33750937054
-
-
Full Technical Report, Computer Sciences Department, University of Wisconsin, Madison
-
R. Shai, S. Jha, and B. P. Miller. Automatic Generation and Analysis of NIDS Attacks. Full Technical Report, Computer Sciences Department, University of Wisconsin, Madison, 2004.
-
(2004)
Automatic Generation and Analysis of NIDS Attacks
-
-
Shai, R.1
Jha, S.2
Miller, B.P.3
-
28
-
-
0037952266
-
Probabilistic alert correlation, in: Recent advances in intrusion detection
-
volume 2212 of Lecture Notes in Computer Science. Springer-Verlag
-
A. Valdes and K. Skinner. Probabilistic alert correlation, in: Recent advances in intrusion detection. In Recent Advances in Intrusion Detection (RAID2002), volume 2212 of Lecture Notes in Computer Science, pages 54-68. Springer-Verlag, 2001.
-
(2001)
Recent Advances in Intrusion Detection (RAID2002)
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
29
-
-
84947286061
-
Measuring false-positive by automated real-time correlated hacking behavior analysis
-
volume 2200 of Lecture Notes in Computer Science. SpringerVerlag
-
J. Wang and I. Lee. Measuring false-positive by automated real-time correlated hacking behavior analysis. In Information Security 4th International Conference, volume 2200 of Lecture Notes in Computer Science, pages 512-. SpringerVerlag, 2001.
-
(2001)
Information Security 4th International Conference
, pp. 512
-
-
Wang, J.1
Lee, I.2
-
31
-
-
0023829320
-
A formal specification and verification method for the prevention of denial of service
-
Oakland, CA USA, April. IEEE Computer Society Press
-
C.-F. Yu and V. D. Gligor. A formal specification and verification method for the prevention of denial of service. In Proceedings of 1988 IEEE Symposium on Security and Privacy, pages 187-202, Oakland, CA USA, April 1988. IEEE Computer Society Press.
-
(1988)
Proceedings of 1988 IEEE Symposium on Security and Privacy
, pp. 187-202
-
-
Yu, C.-F.1
Gligor, V.D.2
|