-
1
-
-
0038443107
-
A new taxonomy of web attacks suitable for efficient encoding
-
July
-
O. Alvarez and S. Petrovic. A new taxonomy of web attacks suitable for efficient encoding. Computers and Security, 22(5):435-449, July 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.5
, pp. 435-449
-
-
Alvarez, O.1
Petrovic, S.2
-
3
-
-
0003411763
-
A taxonomy of Unix and network security vulnerabilities
-
Department of Computer Science, University of California at Davis, May
-
M. Bishop. A taxonomy of Unix and network security vulnerabilities. Technical report, Department of Computer Science, University of California at Davis, May 1995.
-
(1995)
Technical Report
-
-
Bishop, M.1
-
4
-
-
0034226287
-
A revised taxonomy for intrusion-detection systems
-
July-August
-
H. Debar, M. Dacier, and A. Wespi. A revised taxonomy for intrusion-detection systems. Annals of Telecommunications, 55(7-6):361-378, July-August 2000.
-
(2000)
Annals of Telecommunications
, vol.55
, Issue.6-7
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
5
-
-
0029716418
-
A sense of self for unix processes
-
Los Alamitos, CA, IEEE Computer Society Press, 6-8 May, Oakland, California
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, CA, 1996. IEEE Computer Society Press, 6-8 May, Oakland, California.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Los Alamitos, California. IEEE Computer Society Press. 16-18 May, Oakland, California
-
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In IEEE Symposium on Security and Privacy, pages 202-212, Los Alamitos, California, 1994. IEEE Computer Society Press. 16-18 May, Oakland, California.
-
(1994)
IEEE Symposium on Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
7
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3): 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
9
-
-
0003615205
-
A common language for computer security incidents
-
Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, October
-
J. D. Howard and T. A. Longstaff. A common language for computer security incidents. Technical Report SAND98-8667, Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, October 1998.
-
(1998)
Technical Report
, vol.SAND98-8667
-
-
Howard, J.D.1
Longstaff, T.A.2
-
10
-
-
0004229237
-
-
PhD thesis, Comp. Sci. Dept., Purdue University, May
-
I. V. Krsul. Software Vulnerability Analysis. PhD thesis, Comp. Sci. Dept., Purdue University, May 1998.
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.V.1
-
12
-
-
0028514027
-
A taxonomy of computer program security flaws, with examples
-
September
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, 26(3):211-254, September 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
13
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Los Alamitos, California. IEEE Computer Society Press. 14-16 May, Oakland, California
-
W. Lee and D. Xiang. Information-theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, pages 130-143, Los Alamitos, California, 2001. IEEE Computer Society Press. 14-16 May, Oakland, California.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
14
-
-
0030676601
-
How to systematically classify computer security intrusions
-
Los Alamitos, CA. IEEE Computer Society Press. 4-7 May, Oakland, California
-
U. Lindqvist and E. Jonsson. How to systematically classify computer security intrusions. In IEEE Symposium on Security and Privacy, pages 154-163, Los Alamitos, CA, 1997. IEEE Computer Society Press. 4-7 May, Oakland, California.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
15
-
-
84944222170
-
Analysis and results of the 1999 DARPA off-line intrusion detection evaluation
-
2-4 October 2000, Toulouse, France. Springer-Verlag, Heidelberg, Germany
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. Analysis and results of the 1999 DARPA off-line intrusion detection evaluation. In Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, pages 162-182, 2-4 October 2000, Toulouse, France, 2000. Springer-Verlag, Heidelberg, Germany.
-
(2000)
Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
16
-
-
1642416386
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
14-16 September, Louvain-la-Neuve, Belgium
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. J. McClung, D. J. Webber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In First International Workshop on Recent Advances in Intrusion Detection, 14-16 September 1998, Louvain-la-Neuve, Belgium, 2000.
-
(1998)
First International Workshop on Recent Advances in Intrusion Detection
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.J.6
Webber, D.J.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
18
-
-
0036472459
-
Anomaly detection in embedded systems
-
February
-
R. A. Maxion and K. M. C. Tan. Anomaly detection in embedded systems. IEEE Transactions on Computers, 51(2): 108-120, February 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.2
, pp. 108-120
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
19
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
October
-
N. J. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. A. Olsson. A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering, 22(10):719-729, October 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
20
-
-
4544355970
-
-
Slide Presentation, available on the Internet at
-
M. J. Ranum. A taxonomy of Internet attacks. Slide Presentation, available on the Internet at http://pubweb.nfr.net/~mjr/pubs/pdf/internet- attacks.pdf, 1997.
-
(1997)
A Taxonomy of Internet Attacks
-
-
Ranum, M.J.1
-
22
-
-
0003756180
-
-
Columbia University Press, New York, Fourth printing
-
G. G. Simpson. Principles of Animal Taxonomy. Columbia University Press, New York, 1961, Fourth printing 1969.
-
(1961)
Principles of Animal Taxonomy
-
-
Simpson, G.G.1
-
25
-
-
4544332621
-
-
Included in the strace version 4.2 software package, distributed on the RedHat 6.2 Linux installation CD (disc 1)
-
Strace(1) general command manual. Included in the strace version 4.2 software package, distributed on the RedHat 6.2 Linux installation CD (disc 1), 1999.
-
(1999)
Strace(1) General Command Manual
-
-
-
26
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
A. Wespi, G. Vigna, and L. Den, editors, 16-18 October 2002, Zurich, Switzerland, 2002. Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In A. Wespi, G. Vigna, and L. Den, editors, Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), pages 54-73, 16-18 October 2002, Zurich, Switzerland, 2002. Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin, 2002.
-
(2002)
Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002)
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
27
-
-
0036085540
-
"Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
-
Los Alamitos, CA. IEEE Computer Society Press. 12-15 May, Berkeley, California
-
K. M. C. Tan and R. A. Maxion. "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector. In IEEE Symposium on Security and Privacy, pages 188-201, Los Alamitos, CA, 2002. IEEE Computer Society Press. 12-15 May, Berkeley, California.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 188-201
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
28
-
-
0037252253
-
Determining the operational limits of an anomaly-based intrusion detector
-
January
-
K. M. C. Tan and R. A. Maxion. Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communications, 21(1):96-110, January 2003.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 96-110
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
29
-
-
35248821244
-
Hiding intrusions: From the abnormal to the normal and beyond
-
Heidelberg, Germany. Springer-Verlag. 7-9 October, Noordwijkerhout, The Netherlands
-
K. M. C. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In Information Hiding: 5th International Workshop, IH 2002, pages 1-17, Heidelberg, Germany, 2003. Springer-Verlag. 7-9 October 2002, Noordwijkerhout, The Netherlands.
-
(2002)
Information Hiding: 5th International Workshop, IH 2002
, pp. 1-17
-
-
Tan, K.M.C.1
McHugh, J.2
Killourhy, K.3
-
30
-
-
4544338227
-
-
Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, June
-
D. J. Weber. A taxonomy of computer intrusions. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, June 1998.
-
(1998)
A Taxonomy of Computer Intrusions
-
-
Weber, D.J.1
|