-
1
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
March
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach," IEEE Transactions on Sortware Engineering, vol. 20, no. 5, March 1995.
-
(1995)
IEEE Transactions on Sortware Engineering
, vol.20
, Issue.5
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
2
-
-
85084163313
-
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
-
August
-
R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications," Proc. of the USENIX Security Symposium, August 1999.
-
(1999)
Proc. of the USENIX Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
3
-
-
84885639914
-
Detecting Past and Present Intrusions through Vulnerability-Specific Predicates
-
October
-
A. Joshi, S. T. King, G. W. Dunlap, and P. M. Chen, "Detecting Past and Present Intrusions through Vulnerability-Specific Predicates," Proc. of the Symposium on Operating Systems Principles, October 2005.
-
(2005)
Proc. of the Symposium on Operating Systems Principles
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
4
-
-
0023294428
-
An Intrusion-Detection Model
-
February
-
D. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 222-232, February 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
5
-
-
0032313923
-
Intrusion Detection Using Sequences of System Calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
6
-
-
0034829697
-
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
-
May
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, "A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors," Proc. of the IEEE Symposium on Security and Privacy, May 2001.
-
(2001)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
7
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
January
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. of the 7th USENIX Security Conference, January 1998.
-
(1998)
Proc. of the 7th USENIX Security Conference
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
10
-
-
85084164413
-
Bro: A System for Detecting Network Intruders in Real-Time
-
January
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. of the USENIX Security Symposium, January 1998.
-
(1998)
Proc. of the USENIX Security Symposium
-
-
Paxson, V.1
-
12
-
-
85084161648
-
Confining Root Programs with Domain and Type Enforcement (DTE)
-
July
-
K. M. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Shermann, and K. A. Oostendorp, "Confining Root Programs with Domain and Type Enforcement (DTE)," Proc. of the USENIX Security Symposium, July 1996.
-
(1996)
Proc. of the USENIX Security Symposium
-
-
Walker, K.M.1
Sterne, D.F.2
Badger, M.L.3
Petkac, M.J.4
Shermann, D.L.5
Oostendorp, K.A.6
-
13
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
M. Bishop and M. Dilger, "Checking for Race Conditions in File Accesses," Computing Systems, vol. 9, no. 2, pp. 131-152, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
15
-
-
84928016636
-
The Base-Rate Fallacy and the Difficulty of Intrusion Detection
-
Aug
-
S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection," ACM Transactions on Information System Security, vol. 3, no. 3, pp. 186-205, Aug. 2000.
-
(2000)
ACM Transactions on Information System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
16
-
-
0028514027
-
A Taxonomy of Computer Program Security Flaws
-
September
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A Taxonomy of Computer Program Security Flaws," ACM Computing Surveys, vol. 26, no. 3, pp. 211-254, September 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
18
-
-
0003411763
-
University of California, Davis Technical Report CSE-9510
-
May
-
M. Bishop, "A Taxonomy of Unix System and Network Vulnerabilities," University of California, Davis Technical Report CSE-9510, May 1995.
-
(1995)
-
-
Bishop, M.1
-
19
-
-
0029716418
-
A Sense of Self for Unix Processes
-
May
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A Sense of Self for Unix Processes," in Proc. of the IEEE Symposium on Research in Security and Privacy, May 1996.
-
(1996)
Proc. of the IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
20
-
-
51649115328
-
-
Security Focus, BZip2 CHMod File Permission Modification Race Condition Weakness, http://www.securityfocus.com/bid/12954/, 2005.
-
Security Focus, "BZip2 CHMod File Permission Modification Race Condition Weakness," http://www.securityfocus.com/bid/12954/, 2005.
-
-
-
-
21
-
-
51649118374
-
-
Wojciech Purczynski / cliph / jwp@elzabsoft.pl, Exploit for execve/ptrace race condition in Linux kernel up to 2.2.19, 2001.
-
Wojciech Purczynski / cliph / jwp@elzabsoft.pl, "Exploit for execve/ptrace race condition in Linux kernel up to 2.2.19,", 2001.
-
-
-
-
22
-
-
51649116031
-
-
Security Focus, GNU Tar Hostile Destination Path Variant Vulnerability, http://www.securityfocus.com/bid/5834/, 2002.
-
Security Focus, "GNU Tar Hostile Destination Path Variant Vulnerability," http://www.securityfocus.com/bid/5834/, 2002.
-
-
-
-
23
-
-
51649124031
-
-
F-Secure, F-Secure Virus Descriptions: Tornkit, http://www.fsecure.com/v-descs/torn.shtml, 2001.
-
F-Secure, "F-Secure Virus Descriptions: Tornkit," http://www.fsecure.com/v-descs/torn.shtml, 2001.
-
-
-
-
24
-
-
51649097919
-
-
Security Focus, X. Org X Window Server Local Privilege Escalation Vulnerability, http://www.securityfocus.com/bid/17169/, 2006.
-
Security Focus, "X. Org X Window Server Local Privilege Escalation Vulnerability," http://www.securityfocus.com/bid/17169/, 2006.
-
-
-
-
25
-
-
0030677523
-
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach
-
May
-
C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach," Proc. of the IEEE Symposium on Security and Privacy, May 1997.
-
(1997)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
27
-
-
33748060907
-
Modular System Programming in MINIX 3
-
April
-
J. N. Herder, H. Bos, B. Gras, P. Homburg, and A. S. Tanenbaum, "Modular System Programming in MINIX 3," login: The USENIX Magazine, vol. 31, no. 2, April 2006.
-
(2006)
login: The USENIX Magazine
, vol.31
, Issue.2
-
-
Herder, J.N.1
Bos, H.2
Gras, B.3
Homburg, P.4
Tanenbaum, A.S.5
-
30
-
-
33745201000
-
Anomalous System Call Detection
-
February
-
D. Mutz, F. Valeur, C. Kruegel, and G. Vigna, "Anomalous System Call Detection," ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 61-93, February 2006.
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Kruegel, C.3
Vigna, G.4
-
31
-
-
33750340695
-
Behavioral Distance for Intrusion Detection
-
September
-
D. Gao, M. K. Reiter, and D. Song, "Behavioral Distance for Intrusion Detection," in Proc. of RAID 2005, September 2006.
-
(2006)
Proc. of RAID 2005
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
32
-
-
36448960621
-
Environment-Sensitive Intrusion Detection
-
September
-
J. T. Giffin, D. Dagon, S. Jha, W. Lee, and B. P. Miller, "Environment-Sensitive Intrusion Detection," Proc. of the International Symposium on Recent Advances in Intrusion Detection, September 2005.
-
(2005)
Proc. of the International Symposium on Recent Advances in Intrusion Detection
-
-
Giffin, J.T.1
Dagon, D.2
Jha, S.3
Lee, W.4
Miller, B.P.5
-
34
-
-
33745651405
-
Performance Adaptation in Real-Time Intrusion Detection Systems
-
W. Lee, J. B. D. Cabrera, A. Thomas, N. Balwalli, S. Saluja, and Y. Zhang, "Performance Adaptation in Real-Time Intrusion Detection Systems," in Recent Advances in Intrusion Detection, 2002.
-
(2002)
Recent Advances in Intrusion Detection
-
-
Lee, W.1
Cabrera, J.B.D.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
35
-
-
84885774862
-
A Framework for Constructing Features and Models for Intrusion Detection Systems
-
W. Lee and S. J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," ACM Transactions on Information and Systems Security, vol. 3, no. 4, pp. 227-261, 2000.
-
(2000)
ACM Transactions on Information and Systems Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
36
-
-
30644462050
-
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Network Intrusion Alerts
-
September
-
L. Wang, A. Liu, and S. Jajodia, "An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Network Intrusion Alerts," Proc. of the 10th European Symposium on Research in Computer Security (ESORICS 2005), September 2005.
-
(2005)
Proc. of the 10th European Symposium on Research in Computer Security (ESORICS 2005)
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
-
37
-
-
59249106693
-
Detecting Targeted Attacks Using Shadow Honeypots
-
August
-
K. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. Keromytis, "Detecting Targeted Attacks Using Shadow Honeypots," Proc. of the USENIX Security Symposium, August 2005.
-
(2005)
Proc. of the USENIX Security Symposium
-
-
Anagnostakis, K.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.6
-
38
-
-
0036090387
-
STATL: An Attack Language for State-based Intrusion Detection
-
S. T. Eckmann, G. Vigna, and R. A. Kemmerer, "STATL: An Attack Language for State-based Intrusion Detection," Journal of Computer Security, vol. 10, no. 1/2, pp. 71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
|