-
1
-
-
21644443181
-
Extracting attack manifestations to determine log data requirements for intrusion detection
-
Tucson, AZ, USA, December 6-10
-
E. Lundin Barse and E. Jonsson, "Extracting attack manifestations to determine log data requirements for intrusion detection", in Proceedings of the 20th Annual ComputerSecurity Applications Conference (ACSAC 2004), Tucson, AZ, USA, December 6-10, 2004, pp.158-167.
-
(2004)
Proceedings of the 20th Annual ComputerSecurity Applications Conference (ACSAC 2004)
, pp. 158-167
-
-
Lundin Barse, E.1
Jonsson, E.2
-
2
-
-
10644229655
-
-
Ph.D. thesis, Purdue University, West Lafayette, IN, USA, August
-
B. A. Kuperman, A Categorization of Computer Security Monitoring Systems and the Impact on the Design of Audit Sources, Ph.D. thesis, Purdue University, West Lafayette, IN, USA, August 2004.
-
(2004)
A Categorization of Computer Security Monitoring Systems and the Impact on the Design of Audit Sources
-
-
Kuperman, B.A.1
-
3
-
-
4544276923
-
A defence-centric taxonomy based on attack manifestations
-
Florence, Italy, June
-
K. S. Killourhy, Roy A. Maxion, and Kymie M. C. Tan, "A defence-centric taxonomy based on attack manifestations, in Proceedings of the International Conference onDependable Systems and Networks (DSN 2004), Florence, Italy, June 2004.
-
(2004)
Proceedings of the International Conference onDependable Systems and Networks (DSN 2004)
-
-
Killourhy, K.S.1
Maxion, R.A.2
Tan, K.M.C.3
-
4
-
-
0027609384
-
A survey of intrusion detection techniques
-
June
-
T. F. Lunt, "A survey of intrusion detection techniques, Computers & Security, vol. 12, no. 4, pp. 405-418, June, 1993.
-
(1993)
Computers & Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
5
-
-
55349130462
-
-
K. E. Price, Host-based misuse detection and conventional operating systems' audit data collection, M.S. thesis, Purdue University, West Lafayette, IN, USA, 1997.
-
K. E. Price, "Host-based misuse detection and conventional operating systems' audit data collection, M.S. thesis, Purdue University, West Lafayette, IN, USA, 1997.
-
-
-
-
6
-
-
55349136406
-
-
Apache module mod_log_config, http://httpd.apache.org/docs/2. 2/mod/mod_log_config.html, Visited April, 2008.
-
"Apache module mod_log_config", http://httpd.apache.org/docs/2. 2/mod/mod_log_config.html, Visited April, 2008.
-
-
-
-
7
-
-
0003951499
-
-
Sun Microsystems Inc, 2550 Garcia Avenue, Mountain View, CA, USA
-
Sun Microsystems Inc., SunSHIELD Basic Security Module Guide, 2550 Garcia Avenue, Mountain View, CA, USA, 1995.
-
(1995)
SunSHIELD Basic Security Module Guide
-
-
-
8
-
-
0000949239
-
GrIDS - A graph-based intrusion detection system for large networks
-
Baltimore, MD, USA, October 22-25
-
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle, "GrIDS - A graph-based intrusion detection system for large networks", in Proceedings of the 19th National Information Systems Security Conference, Baltimore, MD, USA, October 22-25, 1996.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
9
-
-
0002629036
-
EMERALD: Event monitoring enabling responsesto anomalous live disturbances
-
Washington D.C, USA, September 7-11
-
P. A. Porras and P. G. Neumann, "EMERALD: Event monitoring enabling responsesto anomalous live disturbances", in Proceedings of the 20th NIST-NCSC National Information Systems Security Conference, Washington D.C., USA, September 7-11, 1997, pp. 353-365.
-
(1997)
Proceedings of the 20th NIST-NCSC National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
10
-
-
0034300682
-
Intrusion detection using autonomous agents
-
September
-
E. H. Spafford and D. Zamboni, "Intrusion detection using autonomous agents", Computer Networks, vol. 26, pp. 547-570, September, 2000.
-
(2000)
Computer Networks
, vol.26
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
11
-
-
3943083935
-
Intrusion detection inter-component adaptive negotiation
-
West Lafayette, IN, USA, September 7-9
-
R. J. Feiertag, S. Staniford-Chen, K. N. Levitt, M. Heckman, D. Peticolas, R. Crawford, L. Benzinger, S. Rho, and S. Wu, "Intrusion detection inter-component adaptive negotiation", in Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection (RAID 1999), West Lafayette, IN, USA, September 7-9, 1999.
-
(1999)
Proceedings of the Second International Workshop on Recent Advances in Intrusion Detection (RAID 1999)
-
-
Feiertag, R.J.1
Staniford-Chen, S.2
Levitt, K.N.3
Heckman, M.4
Peticolas, D.5
Crawford, R.6
Benzinger, L.7
Rho, S.8
Wu, S.9
-
12
-
-
84947584002
-
Designing a web of highly-configurable intrusion detection sensors
-
Davis, CA, USA, October 10-12
-
G. Vigna, R. A. Kemmerer, and P. Blix, "Designing a web of highly-configurable intrusion detection sensors", in Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection (RAID 2001), Davis, CA, USA, October 10-12, 2001, pp. 69-84.
-
(2001)
Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection (RAID 2001)
, pp. 69-84
-
-
Vigna, G.1
Kemmerer, R.A.2
Blix, P.3
-
13
-
-
0034499251
-
Adaptation techniques for intrusion detection and intrusion response system
-
Nashville, TN, USA, October 8-11, IEEE
-
D. Ragsdale, C. Carver, J. Humphries, and U. Pooch, "Adaptation techniques for intrusion detection and intrusion response system", in Proceedings of the 2000 IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN, USA, October 8-11, 2000, IEEE, vol. 4, pp. 2344-2349.
-
(2000)
Proceedings of the 2000 IEEE International Conference on Systems, Man, and Cybernetics
, vol.4
, pp. 2344-2349
-
-
Ragsdale, D.1
Carver, C.2
Humphries, J.3
Pooch, U.4
-
14
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention ofbuffer-overflow attacks
-
SanAntonio, TX, USA, January 26-28
-
C. Cowan, C. Pu, D. Maìer, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic adaptive detection and prevention ofbuffer-overflow attacks", in Proceedings of the 7th USENIX Security Symposium, SanAntonio, TX, USA, January 26-28, 1998, pp. 63-78.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maìer, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
15
-
-
84904154606
-
SAM: Security adaptation manager
-
Scottsdale, AZ, USA, December 6-10, IEEE Computer Society
-
H. M. Hinton, C. Cowan, L. M. L. Delcambre, and S. Bowers, "SAM: Security adaptation manager", in Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC), Scottsdale, AZ, USA, December 6-10, 1999, IEEE Computer Society.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC)
-
-
Hinton, H.M.1
Cowan, C.2
Delcambre, L.M.L.3
Bowers, S.4
-
16
-
-
0003578795
-
-
Prentice Hall, Upper Saddle River, NJ, USA, 2nd edition
-
B. Meyer, Object Oriented Software Construction, Prentice Hall, Upper Saddle River, NJ, USA, 2nd edition, 1997.
-
(1997)
Object Oriented Software Construction
-
-
Meyer, B.1
-
17
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach", Transactions on Software Engineering, vol. 21, no. 3, pp. 181-199, 1995.
-
(1995)
Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
18
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA, USA, May 6-8, IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes", in Proceedings of the 1996 IEEE Symposium on Research in Securityand Privacy, Oakland, CA, USA, May 6-8, 1996, pp. 120-128, IEEE Computer Society Press.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Securityand Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
19
-
-
55349107986
-
-
M. Roesch, Snort, http://www.snort.org, 2007, Visited June, 2007.
-
M. Roesch, "Snort", http://www.snort.org, 2007, Visited June, 2007.
-
-
-
-
20
-
-
0141838925
-
Why the magic number seven plus or minus two
-
August
-
T. L. Saaty and M. S. Ozdemir, "Why the magic number seven plus or minus two", Mathematical and Computer Modelling, vol. 38, no. 3, pp. 233-244, August 2003.
-
(2003)
Mathematical and Computer Modelling
, vol.38
, Issue.3
, pp. 233-244
-
-
Saaty, T.L.1
Ozdemir, M.S.2
-
22
-
-
31844436756
-
Dynamic instrumentation of production systems
-
San Fransisco, CA, USA, December 6-8
-
B. M. Cantrill, M. W. Shapiro, and A. H. Leventhal, "Dynamic instrumentation of production systems", in Proceedings of the 6th Symposium on Operating SystemsDesign and Implementation (OSDI'04), San Fransisco, CA, USA, December 6-8, 2004.
-
(2004)
Proceedings of the 6th Symposium on Operating SystemsDesign and Implementation (OSDI'04)
-
-
Cantrill, B.M.1
Shapiro, M.W.2
Leventhal, A.H.3
|