-
1
-
-
0034301517
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
R. Lippmann, et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4) 579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
-
2
-
-
84944222170
-
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
-
Lippmann, R.P. and J. Haines, Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation, in Recent Advances in Intrusion Detection, Third International Workshop, Proc. RAID 2000, 162-182.
-
Recent Advances in Intrusion Detection, Third International Workshop, Proc. RAID 2000
, pp. 162-182
-
-
Lippmann, R.P.1
Haines, J.2
-
3
-
-
33644961664
-
-
Lexington MA: MIT Lincoln Laboratory
-
J. W. Haines, R.P. Lippmann, D.J. Fried, M.A. Zissman, E. Tran, and S.B. Boswell, "1999 DARPA Intrusion Detection Evaluation: Design and Procedures", Lexington MA: MIT Lincoln Laboratory, 2001.
-
(2001)
1999 DARPA Intrusion Detection Evaluation: Design and Procedures
-
-
Haines, J.W.1
Lippmann, R.P.2
Fried, D.J.3
Zissman, M.A.4
Tran, E.5
Boswell, S.B.6
-
5
-
-
84944220475
-
Adaptive, Model-based Monitoring for Cyber Attack Detection
-
A. Valdes, K. Skinner, "Adaptive, Model-based Monitoring for Cyber Attack Detection", Proc. RAID 2000, 80-92.
-
Proc. RAID 2000
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
6
-
-
0141441130
-
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic
-
M. Mahoney, P. K. Chan, "PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic", Florida Tech. technical report CS-2001-04, http://cs.fit.edu/∼tr/
-
Florida Tech. Technical Report CS-2001-04
-
-
Mahoney, M.1
Chan, P.K.2
-
7
-
-
0242456801
-
Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks
-
M. Mahoney, P. K. Chan, "Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks ", Proc. SIGKDD 2002, 376-385.
-
Proc. SIGKDD 2002
, pp. 376-385
-
-
Mahoney, M.1
Chan, P.K.2
-
9
-
-
0037661195
-
Network Traffic Anomaly Detection Based on Packet Bytes
-
M. Mahoney, "Network Traffic Anomaly Detection Based on Packet Bytes", Proc. ACM-SAC 2003.
-
Proc. ACM-SAC 2003
-
-
Mahoney, M.1
-
10
-
-
0009900351
-
Anomaly Detection over Noisy Data using Learned Probability Distributions
-
E. Eskin, "Anomaly Detection over Noisy Data using Learned Probability Distributions", Proc. Intl. Conf. Machine Learning, 2000.
-
(2000)
Proc. Intl. Conf. Machine Learning
-
-
Eskin, E.1
-
11
-
-
0141797880
-
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
D. Barbara and S. Jajodia (editors), Kluwer
-
E. Eskin, A. Arnold, M, Prerau, L. Portnoy & S. Stolfo. "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", In D. Barbara and S. Jajodia (editors), Applications of Data Mining in Computer Security, Kluwer, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
15
-
-
84945294444
-
A Study in the Feasibility of Performing Host-based Anomaly Detection on Windows NT
-
A. Schwartzbard and A.K. Ghosh, "A Study in the Feasibility of Performing Host-based Anomaly Detection on Windows NT", Proc. RAID 1999.
-
Proc. RAID 1999
-
-
Schwartzbard, A.1
Ghosh, A.K.2
-
16
-
-
0038011179
-
Specification Based Anomaly Detection: A New Approach for Detecting Network Intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, S. Zhou, A. Tiwari and H. Yang, "Specification Based Anomaly Detection: A New Approach for Detecting Network Intrusions", Proc. ACM CCS, 2002.
-
(2002)
Proc. ACM CCS
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Zhou, S.5
Tiwari, A.6
Yang, H.7
-
17
-
-
85084163313
-
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
-
R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications", Proc. 8th USENIX Security Symposium 1999.
-
Proc. 8th USENIX Security Symposium 1999
-
-
Sekar, R.1
Uppuluri, P.2
-
18
-
-
33646828569
-
-
M. Tyson, P. Berry, N. Williams, D. Moran, D. Blei, "DERBI: Diagnosis, Explanation and Recovery from computer Break-Ins", http://www.ai.sri.com/∼derbi/, 2000.
-
DERBI: Diagnosis, Explanation and Recovery from Computer Break-Ins
-
-
Tyson, M.1
Berry, P.2
Williams, N.3
Moran, D.4
Blei, D.5
-
20
-
-
0002067431
-
NetSTAT: A Network-based Intrusion Detection System
-
IOS Press
-
G. Vigna and R. Kemmerer, "NetSTAT: A Network-based Intrusion Detection System", Journal of Computer Security, 7(1), IOS Press, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Vigna, G.1
Kemmerer, R.2
-
23
-
-
0034592923
-
On-line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms
-
K. Yamanishi, J. Takeuchi & G. Williams, "On-line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms", Proc. KDD 2000, 320-324.
-
Proc. KDD 2000
, pp. 320-324
-
-
Yamanishi, K.1
Takeuchi, J.2
Williams, G.3
-
26
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", Proc. ACM TISSEC 3(4) 2000, 262-294.
-
(2000)
Proc. ACM TISSEC
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
29
-
-
0003539116
-
Snort - Lightweight Intrusion Detection for Networks
-
M. Roesch, "Snort - Lightweight Intrusion Detection for Networks", Proc. USENIX Lisa 1999.
-
Proc. USENIX Lisa 1999
-
-
Roesch, M.1
-
30
-
-
35248851338
-
-
Source code for PHAD, ALAD, LERAD, NETAD, SAD, EVAL, TF, TM, and AFIL
-
M. Mahoney, Source code for PHAD, ALAD, LERAD, NETAD, SAD, EVAL, TF, TM, and AFIL is available at http://cs.fit.edu/∼mmahoney/dist/
-
-
-
Mahoney, M.1
|