-
2
-
-
84899126047
-
Active mapping: Resisting NIDS evasion without altering traffic
-
Shankar, U., Paxson, V.: Active mapping: resisting NIDS evasion without altering traffic. In: Proc. Symposium on Security and Privacy, pp. 44-61 (2003)
-
(2003)
Proc. Symposium on Security and Privacy
, pp. 44-61
-
-
Shankar, U.1
Paxson, V.2
-
3
-
-
26444591908
-
Enhancing the accuracy of network-based intrusion detection with host-based context
-
Julisch, K, Krügel, C, eds, DIMVA 2005, Springer, Heidelberg
-
Dreger, H., Kreibich, C., Paxson, V., Sommer, R.: Enhancing the accuracy of network-based intrusion detection with host-based context. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
-
-
Dreger, H.1
Kreibich, C.2
Paxson, V.3
Sommer, R.4
-
4
-
-
35248863918
-
-
Taleck, G.: Ambiguity Resolution via Passive OS Fingerprinting. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 192-206. Springer, Heidelberg (2003)
-
Taleck, G.: Ambiguity Resolution via Passive OS Fingerprinting. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 192-206. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
85084160972
-
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
-
Handley, M., Paxson, V., Kreibich, C.: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In: Proc. USENIX Security Symposium (2001)
-
(2001)
Proc. USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
6
-
-
2442501519
-
Protocol Scrubbing: Network Security through Transparent Flow Modification
-
Watson, D., Smart, M., Malan, G.R., Jahanian, F.: Protocol Scrubbing: Network Security through Transparent Flow Modification. IEEE/ACM Transactions on Networking 12(2), 261-273 (2004)
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.2
, pp. 261-273
-
-
Watson, D.1
Smart, M.2
Malan, G.R.3
Jahanian, F.4
-
7
-
-
49949097684
-
-
Pang, R., Paxson, V.: A High-Level Programming Environment for Packet. Trace Anonymization and Transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)
-
Pang, R., Paxson, V.: A High-Level Programming Environment for Packet. Trace Anonymization and Transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)
-
-
-
-
8
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks 31(23-24), 2435-2463 (1999)
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
9
-
-
84969805182
-
Design and Implementation of Netdude, a Framework for Packet Trace Manipulation
-
Kreibich, C.: Design and Implementation of Netdude, a Framework for Packet Trace Manipulation. In: Proc. USENIX Technical Conference, FREENIX track (2004)
-
(2004)
Proc. USENIX Technical Conference, FREENIX track
-
-
Kreibich, C.1
-
13
-
-
49949094598
-
-
Ptacek, T., Newsham, T.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Inc. (January 1998)
-
Ptacek, T., Newsham, T.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Inc. (January 1998)
-
-
-
-
14
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant, exploits
-
Vigna, G., Robertson, W., Balzarotti, D.: Testing network-based intrusion detection signatures using mutant, exploits. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 21-30 (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 21-30
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
15
-
-
21644443817
-
-
Rubin, S., Jha, S., Miller, B.: Automatic Generation and Analysis of NIDS Attacks. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 00, pp. 28-38 (2004)
-
Rubin, S., Jha, S., Miller, B.: Automatic Generation and Analysis of NIDS Attacks. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), vol. 00, pp. 28-38 (2004)
-
-
-
-
16
-
-
49949086486
-
-
Marty, R.: Thor - A Tool to Test Intrusion Detection Systems by Variations of Attacks. Master's thesis, Swiss Federal Institute of Technology, Zurich, Switzerland (2002)
-
Marty, R.: Thor - A Tool to Test Intrusion Detection Systems by Variations of Attacks. Master's thesis, Swiss Federal Institute of Technology, Zurich, Switzerland (2002)
-
-
-
|