-
1
-
-
0003539116
-
Snort: Lightweight intrusion detection for networks
-
November
-
M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proc. USENIX LISA, November 1999.
-
(1999)
Proc. USENIX LISA
-
-
Roesch, M.1
-
2
-
-
0033295259
-
-
V. Paxson, Bro: a System for Detecting Network Intruders in Real-Time, Computer Networks, 31, no. 23-24, pp. 2435.2463, 1999.
-
V. Paxson, "Bro: a System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, no. 23-24, pp. 2435.2463, 1999.
-
-
-
-
3
-
-
50249086150
-
-
T. H. Ptacek and T. N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc., Tech. Rep., Jan. 1998, http://insecure.org/stf/secnet_ids/secnet_ids.html.
-
T. H. Ptacek and T. N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection," Secure Networks, Inc., Tech. Rep., Jan. 1998, http://insecure.org/stf/secnet_ids/secnet_ids.html.
-
-
-
-
4
-
-
0033890508
-
Transport and Application Protocol Scrubbing
-
Apr
-
G. R. Malan, D. Watson, F. Jahanian, and P. Howell, "Transport and Application Protocol Scrubbing," in Proc. IEEE INFOCOM, Apr. 2000.
-
(2000)
Proc. IEEE INFOCOM
-
-
Malan, G.R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
5
-
-
85084160972
-
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
-
Aug
-
M. Handley, V. Paxson, and C. Kreibich, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," in Proc. USENIX Security Symposium, Aug. 2001.
-
(2001)
Proc. USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
6
-
-
61749084944
-
Detecting Evasion Attacks at High Speeds Without Reassembly
-
Sept
-
G. Varghese, J. A. Fingerhut, and F. Bonomi, "Detecting Evasion Attacks at High Speeds Without Reassembly," in Proc. ACM SIGCOMM, Sept. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Varghese, G.1
Fingerhut, J.A.2
Bonomi, F.3
-
7
-
-
84889160249
-
fragroute
-
Dug Song, "fragroute," http://monkey.org/~dugsong/fragroute/.
-
-
-
Song, D.1
-
11
-
-
14844312929
-
Operational Experiences with High-Volume Network Intrusion Detection
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, "Operational Experiences with High-Volume Network Intrusion Detection," in Proceedings of CCS, 2004.
-
(2004)
Proceedings of CCS
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
12
-
-
39749145622
-
Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines
-
Sept
-
F. Bonomi, M. Mitzenmacher, R. Panigrah, S. Singh, and G. Varghese, "Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines," in Proc. ACM SIGCOMM, Sept. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Bonomi, F.1
Mitzenmacher, M.2
Panigrah, R.3
Singh, S.4
Varghese, G.5
-
17
-
-
50249113579
-
-
_, "Configuring TCP Normalization," 2006, http://www.cisco.com/ en/US/products/ps6120/products_configuration_guide_chapter09186a008054ecb8. html#wp1051891.
-
(2006)
Configuring TCP Normalization
-
-
Systems, C.1
-
19
-
-
14844303748
-
On the Difficulty of Scalably Detecting Network Attacks
-
Oct
-
K. Levchenko, R. Paturi, and G. Varghese, "On the Difficulty of Scalably Detecting Network Attacks," in Proc. ACM CCS, Oct. 2004.
-
(2004)
Proc. ACM CCS
-
-
Levchenko, K.1
Paturi, R.2
Varghese, G.3
|