-
1
-
-
38149098216
-
-
accessed September 13, 2006
-
Apple Computer: Tunneling RTSP and RTP over HTTP (2006) (accessed September 13, 2006), http://developer.apple.com/documentation/QuickTime/QTSS/ Concepts/chapter-2.section.14. html
-
Apple Computer: Tunneling RTSP and RTP over HTTP
-
-
-
2
-
-
84942240686
-
Intrusion detection testing and benchmarking methodologies
-
Washington, DC, USA, IEEE Computer Society, Los Alamitos
-
Athanasiades, N., Abler, R., Levine, J., Owen, H., Riley, G.: Intrusion detection testing and benchmarking methodologies. In: IEEE-IWIA '03: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), Washington, DC, USA, page 63, IEEE Computer Society, Los Alamitos (2003)
-
(2003)
IEEE-IWIA '03: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03)
, pp. 63
-
-
Athanasiades, N.1
Abler, R.2
Levine, J.3
Owen, H.4
Riley, G.5
-
3
-
-
38149057897
-
-
Booth, D., Haas, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture. Technical Report W3C Working Group Note 11 February 2004, World Wide Web Consortium (W3C) (2004) (accessed 2007-04-05), online at http://www.w3.org/TR/ws-arch/
-
Booth, D., Haas, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture. Technical Report W3C Working Group Note 11 February 2004, World Wide Web Consortium (W3C) (2004) (accessed 2007-04-05), online at http://www.w3.org/TR/ws-arch/
-
-
-
-
5
-
-
38149103866
-
-
Corporation, M.: Common vulnerabilities and exposures (accessed June 16, 2006), http://eve.mitre.org/
-
Corporation, M.: Common vulnerabilities and exposures (accessed June 16, 2006), http://eve.mitre.org/
-
-
-
-
6
-
-
38149001244
-
-
Curry, D., Debar, H.: Intrusion detection message exchange format data model and extensible markup language (XML) document type definition (December 2002) (accessed January 1, 2003), http://www.ietf.org/internet-drafts/draft- ietf-idwg-idmef-xml-09.txt
-
Curry, D., Debar, H.: Intrusion detection message exchange format data model and extensible markup language (XML) document type definition (December 2002) (accessed January 1, 2003), http://www.ietf.org/internet-drafts/draft- ietf-idwg-idmef-xml-09.txt
-
-
-
-
7
-
-
38149140620
-
-
cve.mitre.org: CVE-1999-0107 (July 1999) (accessed September 3, 2006), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0107
-
cve.mitre.org: CVE-1999-0107 (July 1999) (accessed September 3, 2006), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0107
-
-
-
-
8
-
-
38149009321
-
-
cve.mitre.org: CVE-1999-1199 (September 2004) (accessed October 30, 2005), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE=1999-1199
-
cve.mitre.org: CVE-1999-1199 (September 2004) (accessed October 30, 2005), http://www.eve.mitre.org/cgi-bin/cvename.cgi?name=CVE=1999-1199
-
-
-
-
9
-
-
0028911698
-
Gauging similarity with n-grams: Language-independent categorization of text
-
Damashek, M.: Gauging similarity with n-grams: language-independent categorization of text. Science 267(5199), 843-848 (1995)
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
10
-
-
0042536297
-
-
September
-
Danyliw, R., Dougherty, C., Householder, A., Ruefle, R.: CERT advisory CA-2001-26 Nimda worm (September 2001), http://www.cert.org/advisories/CA-2001- 26.html
-
(2001)
CERT advisory CA-2001-26 Nimda worm
-
-
Danyliw, R.1
Dougherty, C.2
Householder, A.3
Ruefle, R.4
-
11
-
-
2542563730
-
An experimentation workbench for intrusion detection systems
-
6519, IBM Research Division, Zurich Research Laboratory, 8803 Rüuschlikon, Switzerland September
-
Debar, H., Dacier, M., Wespi, A., Lampart, S.: An experimentation workbench for intrusion detection systems. Technical Report RZ 6519, IBM Research Division, Zurich Research Laboratory, 8803 Rüuschlikon, Switzerland (September 1998)
-
(1998)
Technical Report RZ
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
12
-
-
38149064922
-
-
accessed September 13, 2006
-
Eastlake, D., Khare, R., Miller, J.: Selecting payment mechanisms over HTTP (2006) (accessed September 13, 2006), http://www.w3.org/TR/WD-jepi-uppflow- 970106
-
Selecting payment mechanisms over HTTP
-
-
Eastlake, D.1
Khare, R.2
Miller, J.3
-
13
-
-
2342633897
-
Measuring normality in http traffic for anomaly-based intrusion detection
-
Estévez-Tapiador, J.M., García-Teodoro, P., Díaz-Verdejo, J.E.: Measuring normality in http traffic for anomaly-based intrusion detection. Journal of Computer Networks 45(2), 175-193 (2004)
-
(2004)
Journal of Computer Networks
, vol.45
, Issue.2
, pp. 175-193
-
-
Estévez-Tapiador, J.M.1
García-Teodoro, P.2
Díaz-Verdejo, J.E.3
-
14
-
-
0003415244
-
-
accessed October 2, 2002
-
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., BernersLee, T.: Hypertext transfer protocol - HTTP/1.1. RFC 2616 (June 1999) (accessed October 2, 2002), ftp://ftp.isi.edu/in-notes/rfc2616.txt
-
Hypertext transfer protocol - HTTP/1.1. RFC 2616 (June 1999)
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
BernersLee, T.7
-
15
-
-
33644961664
-
DARPA intrusion detection system evaluation: Design and procedures
-
Technical Report TR-1062, Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA, USA February
-
Haines, J.W., Lippmann, R.P., Fried, D.J., Tran, E., Boswell, S., Zissman, M.A.: 1999 DARPA intrusion detection system evaluation: Design and procedures. Technical Report TR-1062, Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA, USA (February 2001)
-
(1999)
-
-
Haines, J.W.1
Lippmann, R.P.2
Fried, D.J.3
Tran, E.4
Boswell, S.5
Zissman, M.A.6
-
17
-
-
38149081854
-
-
Heberlein, L.: Network security monitor (NSM)-final report. Technical report, University of California at Davis Computer Security Lab, Lawrence Livermore National Laboratory project deliverable (1995), http://seclab.cs. ucdavis.edu/papers/NSM-final.pdf
-
Heberlein, L.: Network security monitor (NSM)-final report. Technical report, University of California at Davis Computer Security Lab, Lawrence Livermore National Laboratory project deliverable (1995), http://seclab.cs. ucdavis.edu/papers/NSM-final.pdf
-
-
-
-
18
-
-
0024984013
-
A network security monitor
-
Oakland, CA, USA, May 7-9, IEEE Computer Society Press, Los Alamitos, CA, USA
-
Heberlein, L., Dias, G., Levitt, K., Mukherjee, B., Wood, J., Wolber, D.: A network security monitor. In: 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 7-9, 1990, pp. 296-304. IEEE Computer Society Press, Los Alamitos, CA, USA (1990)
-
(1990)
1990 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
19
-
-
1542317098
-
WebDAV: What it is, what it does, why you need it
-
New York, NY, USA, pp, ACM Press, New York
-
Hernández, L.O., Pegan, M.: WebDAV: what it is, what it does, why you need it. In: SIGUCCS '03: Proceedings of the 31st annual ACM SIGUCCS conference on User services, New York, NY, USA, pp. 249-254. ACM Press, New York (2003)
-
(2003)
SIGUCCS '03: Proceedings of the 31st annual ACM SIGUCCS conference on User services
, pp. 249-254
-
-
Hernández, L.O.1
Pegan, M.2
-
20
-
-
38149124483
-
-
PhD thesis, Department of Computer Science, University of New Mexico, Albuquerque, NM
-
Ingham, K.L.: Anomaly Detection for HTTP Intrusion Detection: Algorithm Comparisons and the Effect of Generalization on Accuracy. PhD thesis, Department of Computer Science, University of New Mexico, Albuquerque, NM, 87131 (2007)
-
(2007)
Anomaly Detection for HTTP Intrusion Detection: Algorithm Comparisons and the Effect of Generalization on Accuracy
, pp. 87131
-
-
Ingham, K.L.1
-
21
-
-
33846369107
-
Learning DFA representations of HTTP for protecting web applications
-
Ingham, K.L., Somayaji, A., Burge, J., Forrest, S.: Learning DFA representations of HTTP for protecting web applications. Computer Networks 51(5), 1239-1255 (2007)
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1239-1255
-
-
Ingham, K.L.1
Somayaji, A.2
Burge, J.3
Forrest, S.4
-
23
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Computer Networks 48(5), 717-738 (2005)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
24
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34(4), 579-595 (2000)
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
27
-
-
84944239811
-
-
McHugh, J.: The 1998 Lincoln Laboratory IDS evaluation - a critique. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, 1907, pp. 145-161. Springer, Heidelberg (2000)
-
McHugh, J.: The 1998 Lincoln Laboratory IDS evaluation - a critique. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 145-161. Springer, Heidelberg (2000)
-
-
-
-
28
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and Systems Security 3(4), 262-294 (2000)
-
(2000)
ACM Transactions on Information and Systems Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
29
-
-
38149123005
-
-
Microsoft Corporation:, accessed Sept 13, 2006
-
Microsoft Corporation: Exchange server 2003 RPC over HTTP deployment scenarios (2006) (accessed Sept 13, 2006), http://www.microsoft.com/ technetprodtechnol/exchange/2003/library/ex2k3rpc.mspx
-
Exchange server 2003 RPC over HTTP deployment scenarios
-
-
-
30
-
-
3643079262
-
A software platform for testing intrusion detection systems
-
Puketza, N., Chung, M., Olsson, R., Mukherjee, B.: A software platform for testing intrusion detection systems. IEEE Software 14(5), 43-51 (1997)
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.3
Mukherjee, B.4
-
31
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza, N.J., Zhang, K., Chung, M., Mukherjee, B., Olsson, R.A.: A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering 22(10), 719-729 (1996)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
32
-
-
83455223163
-
Using generalization and characterization techniques in the anomaly-based detection of web attacks
-
Robertson, W., Vigna, G., Kruegel, C., Kemmerer, R.A.: Using generalization and characterization techniques in the anomaly-based detection of web attacks, In: Network and Distributed System Security Symposium Conference Proceedings: 2006. Internet Society (2006) (accessed February 12, 2006), http://www.isoc.org/isoc/conferences/ndss/06/proceedings/html/2006/papers/ anomaly_signatures.pdf
-
(2006)
Network and Distributed System Security Symposium Conference Proceedings: 2006. Internet Society (2006) (accessed February 12
-
-
Robertson, W.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
33
-
-
0002297358
-
Hidden Markov Model induction by bayesian model merging
-
Hanson, S.J, Cowan, J.D, Giles, C.L, eds, Morgan Kaufmann, San Mateo, CA
-
Stoicke, A., Omohundro, S.: Hidden Markov Model induction by bayesian model merging. In: Hanson, S.J., Cowan, J.D., Giles, C.L. (eds.) Advances in Neural Information Processing Systems, vol. 5, pp. 11-18. Morgan Kaufmann, San Mateo, CA (1993)
-
(1993)
Advances in Neural Information Processing Systems
, vol.5
, pp. 11-18
-
-
Stoicke, A.1
Omohundro, S.2
-
34
-
-
0003615076
-
Best-first model merging for hidden Markov model induction
-
Technical Report TR-94-003, International Computer Science Institute, Center Street, Suite 600, Berkeley, CA, 94704-1198
-
Stolcke, A., Omohundro, S.M.: Best-first model merging for hidden Markov model induction. Technical Report TR-94-003, International Computer Science Institute, 1947 Center Street, Suite 600, Berkeley, CA, 94704-1198 (1994)
-
(1994)
, pp. 1947
-
-
Stolcke, A.1
Omohundro, S.M.2
-
35
-
-
21644481499
-
A serial combination of anomaly and misuse IDSes applied to HTTP traffic
-
Tombini, E., Debar, H., Mé, L., Ducassé, M.: A serial combination of anomaly and misuse IDSes applied to HTTP traffic. In: 20th Annual Computer Security Applications Conference (2004)
-
(2004)
20th Annual Computer Security Applications Conference
-
-
Tombini, E.1
Debar, H.2
Mé, L.3
Ducassé, M.4
-
36
-
-
38149067161
-
-
Vargiya, R., Chan, P.: Boundary detection in tokenizing network application payload for anomaly detection. In: Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC). Workshop held in conjunction with The Third IEEE International Conference on Data Mining, November 2003, pp. 50-59 (2003) (accessed April 5, 2006), available at http://www.cs.fit.edu/~pkc/ dmsec03/dmsec03notes.pdf
-
Vargiya, R., Chan, P.: Boundary detection in tokenizing network application payload for anomaly detection. In: Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC). Workshop held in conjunction with The Third IEEE International Conference on Data Mining, November 2003, pp. 50-59 (2003) (accessed April 5, 2006), available at http://www.cs.fit.edu/~pkc/ dmsec03/dmsec03notes.pdf
-
-
-
-
37
-
-
51049097774
-
IntruDetector: A software platform for testing network intrusion detection algorithms
-
New Orleans, LA, USA, December 10-14, IEEE Computer Society, Los Alamitos, CA, USA
-
Wan, T., Yang, X.D.: IntruDetector: a software platform for testing network intrusion detection algorithms. In: Seventeenth Annual Computer Security Applications Conference, New Orleans, LA, USA, December 10-14, 2001, IEEE Computer Society, Los Alamitos, CA, USA (2001)
-
(2001)
Seventeenth Annual Computer Security Applications Conference
-
-
Wan, T.1
Yang, X.D.2
-
38
-
-
35048885009
-
-
Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 203-222. Springer, Heidelberg (2004)
-
Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
-
-
-
-
39
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
IEEE Computer Society Press, Los Alamitos
-
Warrender, C., Forrest, S., Pearlmutter, B.A.: Detecting intrusions using system calls: Alternative data models. In: IEEE Symposium on Security and Privacy, pp. 133-145. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.A.3
-
40
-
-
38149140619
-
-
accessed September 13, 2006
-
Wiers, D.: Tunneling SSH over HTTP(S) (2006) (accessed September 13, 2006), http://dag.wieers.com/howto/ssh-http-tunneling/
-
Tunneling SSH over HTTP(S)
-
-
Wiers, D.1
|