-
1
-
-
84860029979
-
-
DARPA intrusion detection evaluation
-
The MIT lincoln labs evaluation data set, DARPA intrusion detection evaluation. Available at http://www.ll.mit.edu/IST/idevayindex.html.
-
The MIT Lincoln Labs Evaluation Data Set
-
-
-
4
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Gran Canaria, January
-
S. Buchegger and J.-Y. Le Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of Tenth Euromicro PDF (Parallel, Distributed and Network-based Processing), pages 403 - 410, Gran Canaria, January 2002.
-
(2002)
Proceedings of Tenth Euromicro PDF (Parallel, Distributed and Network-based Processing)
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
6
-
-
33646021971
-
Towards a theory of intrusion detection
-
Milan, Italy, September 12-14. Lecture Notes in Computer Science 3679 Springer
-
G. Di Crescenzo, A. Ghosh, and R. Talpade. Towards a theory of intrusion detection. In ESORICS 2005, 10th European Symposium on Research in Computer Security, pages 267-286, Milan, Italy, September 12-14 2005. Lecture Notes in Computer Science 3679 Springer.
-
(2005)
ESORICS 2005, 10th European Symposium on Research in Computer Security
, pp. 267-286
-
-
Di Crescenzo, G.1
Ghosh, A.2
Talpade, R.3
-
7
-
-
4143149628
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
D. Barbara and S. Jajodia, editors. Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In D. Barbara and S. Jajodia, editors, Data Mining for Security Applications. Kluwer, 2002.
-
(2002)
Data Mining for Security Applications
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
8
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA, USA. IEEE Computer Society Press
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In Proceedigns of the 1996 IEEE Symposium on Security & Privacy, pages 120-12, Oakland, CA, USA, 1996. IEEE Computer Society Press.
-
(1996)
Proceedigns of the 1996 IEEE Symposium on Security & Privacy
, pp. 120-212
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.A.4
-
9
-
-
0034827684
-
Evaluation of intrusion detectors: A decision theory approach
-
Oakland, CA, USA
-
J. E. Gaffney and J. W. Ulvila. Evaluation of intrusion detectors: A decision theory approach. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 50-61, Oakland, CA, USA, 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 50-61
-
-
Gaffney, J.E.1
Ulvila, J.W.2
-
10
-
-
34247332710
-
Measuring intrusion detection capability: An information-theoretic approach
-
Taipei, Taiwan, March
-
G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric. Measuring intrusion detection capability: An information-theoretic approach. In Proceedings of ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '06), Taipei, Taiwan, March 2006.
-
(2006)
Proceedings of ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '06)
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
11
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
H. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In 10th USENIX Security Symposium, 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Handley, H.1
Kreibich, C.2
Paxson, V.3
-
12
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, USA
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In IEEE Symposium on Security & Privacy, pages 211-225, Oakland, CA, USA, 2004.
-
(2004)
IEEE Symposium on Security & Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
13
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Baltimore, MD, August
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In Proceedings of the 2005 USENIX Security Symposium, pages 161-176, Baltimore, MD, August 2005.
-
(2005)
Proceedings of the 2005 USENIX Security Symposium
, pp. 161-176
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
14
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
December
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Bayesian event classification for intrusion detection. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), pages 14-24, December 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC)
, pp. 14-24
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
15
-
-
33751040190
-
Reverse engineering of network signatures
-
Gold Coast, Australia, May
-
C. Kruegel, D. Mutz, W. Robertson, G. Vigna, and R. Kernmerer. Reverse Engineering of Network Signatures. In Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold Coast, Australia, May 2005.
-
(2005)
Proceedings of the AusCERT Asia Pacific Information Technology Security Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Vigna, G.4
Kernmerer, R.5
-
17
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Oakland, CA, USA
-
W. Lee, S. J. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In Proceedings of the IEEE Symposium on Security & Privacy, pages 120-132, Oakland, CA, USA, 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security & Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
18
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
January
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In DARPA Information Survivability Conference and Exposition, volume 2, pages 12-26, January 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
20
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
ACM Press
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255-265. ACM Press, 2000.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
21
-
-
85046873967
-
The DET curve in assessment of detection task performance
-
Rhodes, Greece
-
A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki. The DET curve in assessment of detection task performance. In Proceedings of the 5th European Conference on Speech Communication and Technology (Eurospeech'97), pages 1895-1898, Rhodes, Greece, 1997.
-
(1997)
Proceedings of the 5th European Conference on Speech Communication and Technology (Eurospeech'97)
, pp. 1895-1898
-
-
Martin, A.1
Doddington, G.2
Kamm, T.3
Ordowski, M.4
Przybocki, M.5
-
22
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by the Lincoln laboratory
-
November
-
J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by the Lincoln laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4):262-294, November 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
24
-
-
0035283313
-
Robust classification for imprecise environments
-
March
-
F. Provost and T. Fawcett. Robust classification for imprecise environments. Machine Learning, 42(3):203-231, March 2001.
-
(2001)
Machine Learning
, vol.42
, Issue.3
, pp. 203-231
-
-
Provost, F.1
Fawcett, T.2
-
25
-
-
0004145058
-
-
Technical report, Secure Networks, Inc., January
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., January 1998.
-
(1998)
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
26
-
-
1942443747
-
-
Technical Report 95, National Institute of Statistical Sciences
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M. Theus, and Y. Vardi. Computer intrusion: Detecting masquerades. Technical Report 95, National Institute of Statistical Sciences, 1999.
-
(1999)
Computer Intrusion: Detecting Masquerades
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
27
-
-
0038825042
-
Active mapping: Resisting NIDS evasion without altering traffic
-
Oakland, CA, USA
-
U. Shankar and V. Paxson. Active mapping: Resisting NIDS evasion without altering traffic. In Proceedings of the 2003 IEEE Symposium on Security & Privacy, pages 44-61, Oakland, CA, USA, 2003.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security & Privacy
, pp. 44-61
-
-
Shankar, U.1
Paxson, V.2
-
28
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
-
January
-
S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan. Cost-based modeling for fraud and intrusion detection: Results from the JAM project. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, pages 130-144, January 2000.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, pp. 130-144
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
29
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Zurich, Switzerland, October
-
K. Tan, K. Killourchy, and R. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In Proceeedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 54-73, Zurich, Switzerland, October 2002.
-
(2002)
Proceeedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 54-73
-
-
Tan, K.1
Killourchy, K.2
Maxion, R.3
-
30
-
-
35248821244
-
Hiding intrusions: From the abnormal to the normal and beyond
-
Noordwijkerhout, The Netherlands, October
-
K. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In Information Hiding: 5th International Workshop, pages 1-17, Noordwijkerhout, The Netherlands, October 2002.
-
(2002)
Information Hiding: 5th International Workshop
, pp. 1-17
-
-
Tan, K.1
McHugh, J.2
Killourhy, K.3
-
32
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
Tucson, AZ, December
-
G. Vigna, S. Gwalani, K. Srinivasan, E. Belding-Royer, and R. Kemmerer. An Intrusion Detection Tool for AODV-based Ad Hoc Wireless Networks. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), pages 16-27, Tucson, AZ, December 2004.
-
(2004)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.4
Kemmerer, R.5
-
33
-
-
14844322335
-
Testing network-based intrusion detection signatures Using mutant exploits
-
Washington, DC, October
-
G. Vigna, W. Robertson, and D. Balzarotti. Testing Network-based Intrusion Detection Signatures Using Mutant Exploits. In Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS), pages 21-30, Washington, DC, October 2004.
-
(2004)
N Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS)
, pp. 21-30
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
35
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA, USA, May
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In Proceedings of the 1999 IEEE Symposium on Security & Privacy, pages 133-145, Oakland, CA, USA, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security & Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
36
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
September
-
Y. Zhang, W. Lee, and Y. Huang. Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Mobile Networks and Applications (MONET), 9(5):545-556, September 2003.
-
(2003)
ACM/Kluwer Mobile Networks and Applications (MONET)
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
|