-
1
-
-
0003914522
-
-
Available via Software Engineering Institute, Cited 9 January 2007
-
Allen J, Christie A, Fithen W, McHugh J, Pickel J, Stone E (2000) State of the Practice of Intrusion Detection Technologies. Available via Software Engineering Institute. http://www.sei.cmu.edu/publications/ documents/99.reports/99tr028/99tr028abstract.html. Cited 9 January 2007
-
(2000)
State of the Practice of Intrusion Detection Technologies
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stone, E.6
-
2
-
-
84928016636
-
The Base-Rate Fallacy and the Difficulty of Intrusion Detection
-
Axelsson S (2000) The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security 3(3), 186-205
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
3
-
-
48249151255
-
-
BASE (, BASE) Project. Available via BASE Project, Cited 25 April 2007
-
BASE (2007) Basic Analysis and Security Engine (BASE) Project. Available via BASE Project. http://base.secureideas.net/. Cited 25 April 2007
-
(2007)
Basic Analysis and Security Engine
-
-
-
5
-
-
48249144537
-
Microsoft IIS 5.0 Translate: F
-
Available via Security Focus, Cited 9 June 2007
-
Bugtraq (2007a) Microsoft IIS 5.0 "Translate: F" Source Disclosure Vulnerability. Available via Security Focus. http://www.securityfocus.com/bid/1578. Cited 9 June 2007
-
(2007)
Source Disclosure Vulnerability
-
-
Bugtraq1
-
10
-
-
48249124716
-
-
GCIA , Available via Global Information Assurance Certification, Cited 8 May 2007
-
GCIA (2008) GIAC Certified Intrusion Analyst (GCIA). Available via Global Information Assurance Certification. http://www.giac.org/ certifications/security/gcia.php. Cited 8 May 2007
-
(2008)
GIAC Certified Intrusion Analyst (GCIA)
-
-
-
11
-
-
11844251618
-
-
2Rev edition. Sams Publishing, United States of America
-
Koziol J (2003) Intrusion Detection with Snort, 2Rev edition. Sams Publishing, United States of America
-
(2003)
Intrusion Detection with Snort
-
-
Koziol, J.1
-
12
-
-
85066851244
-
Alert Verification: Determining the Success of Intrusion Attempts
-
Available via Department of Computer Science, University of California, Santa Barbara, Cited 19 May 2007
-
Kruegel C and Robertson W (2004) Alert Verification: Determining the Success of Intrusion Attempts, Proc. First Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2004). Available via Department of Computer Science, University of California, Santa Barbara. http://www.cs.ucsb.edu/wkr/publications/ dimva04verification.pdf. Cited 19 May 2007
-
(2004)
Proc. First Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA
-
-
Kruegel, C.1
Robertson, W.2
-
13
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann RP, Haines JW, Fried DJ, Korba J and Das KJ (2000) The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34:579-595
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.P.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.J.5
-
14
-
-
35248857893
-
-
Mahoney MV and Chan PK (2003) An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In Recent Advances in Intrusion Detection (RAID2003), Lecture Notes in Computer Science, Springer-Verlag 2820:220-237
-
Mahoney MV and Chan PK (2003) An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In Recent Advances in Intrusion Detection (RAID2003), Lecture Notes in Computer Science, Springer-Verlag 2820:220-237
-
-
-
-
15
-
-
85019691440
-
Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
-
McHugh J (2000) Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3(4), 262-294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
16
-
-
3543072024
-
An Overview of Issues in Testing Intrusion Detection Systems
-
Available via National Institute of Standards and Technology, Cited 7 July 2007
-
Mell P, Hu V, Lippmann R, Haines J and Zissman M(2003) An Overview of Issues in Testing Intrusion Detection Systems. NISTIR 7007. Available via National Institute of Standards and Technology. http://csrc.nist.gov/ publications/nistir/nistir-7007.pdf. Cited 7 July 2007
-
(2003)
NISTIR
, pp. 7007
-
-
Mell, P.1
Hu, V.2
Lippmann, R.3
Haines, J.4
Zissman, M.5
-
17
-
-
39049123726
-
An Archilles' Heel in Signature-Based IDS: Squealing False Positives in SNORT
-
Univ. of California-Davis
-
Patton S, Yurcik W and Doss D (2001) An Archilles' Heel in Signature-Based IDS: Squealing False Positives in SNORT. Recent Advanced in Intrusion Detection (RAID), Univ. of California-Davis.
-
(2001)
Recent Advanced in Intrusion Detection (RAID)
-
-
Patton, S.1
Yurcik, W.2
Doss, D.3
-
18
-
-
84898658527
-
-
Available via SourceForge.net, Cited 30 June 2007
-
Ritter J (2006) Ngrep - network grep. Available via SourceForge.net. http://ngrep.sourceforge.net. Cited 30 June 2007
-
(2006)
Ngrep - network grep
-
-
Ritter, J.1
-
19
-
-
48249100220
-
-
Available via Snort, Cited 1 July 2007
-
Snort (2007a) Event Thresholding. Available via Snort. http://www.snort.org/docs/snort_htmanuals/htmanual_2.4/node22.html. Cited 1 July 2007
-
(2007)
Event Thresholding
-
-
-
20
-
-
48249123952
-
-
Available via Snort, Cited 9 June 2007
-
Snort (2007b) WEB-IIS view source via translate header. Available via Snort. http://snort.org/pub-bin/sigs.cgi?sid=1042. Cited 9 June 2007
-
(2007)
WEB-IIS view source via translate header
-
-
-
21
-
-
48249149245
-
-
Available via Snort, Cited 9 June 2007
-
Snort (2007c) WEB-MISC robots.txt access. Available via Snort. http://www.snort.org/pub-bin/sigs.cgi?sid=1:1852. Cited 9 June 2007
-
(2007)
WEB-MISC robots.txt access
-
-
-
22
-
-
48249113469
-
-
Available via Snort, Cited 13 June 2007
-
Snort (2007d) ICMP L3retriever Ping. Available via Snort. http://www.snort.org/pub-bin/sigs.cgi?sid=1:466. Cited 13 June 2007
-
(2007)
ICMP L3retriever Ping
-
-
-
23
-
-
48249112715
-
The problem of false alarms: Evaluation with Snort and DARPA 1999 Dataset
-
Turin, Italy, 1-5 September
-
Tjhai GC, Papadaki M, Furnell SM and Clarke NL (2008) The problem of false alarms: Evaluation with Snort and DARPA 1999 Dataset. Submitted to TrustBus 2008, Turin, Italy, 1-5 September 2008
-
(2008)
Submitted to TrustBus 2008
-
-
Tjhai, G.C.1
Papadaki, M.2
Furnell, S.M.3
Clarke, N.L.4
-
24
-
-
48249144171
-
-
Available via Web Server Talk, Cited 12 July 2007
-
Web Server Talk (2005) L3Retriever false positives. Available via Web Server Talk. http://www.webservertalk.com/message893082.html. Cited 12 July 2007
-
(2005)
L3Retriever false positives
-
-
-
25
-
-
48249142510
-
-
WebDAV , Available via Sambar Server Documentation, Cited 20 June 2007
-
WebDAV (2001) WebDAV Overview. Available via Sambar Server Documentation. http://www.sambar.com/syshelp/webdav.htm. Cited 20 June 2007
-
(2001)
WebDAV Overview
-
-
|