-
2
-
-
58049125272
-
APHRODITE: An Anomaly-based Architecture for False Positive Reduction
-
Technical Report TR-CTIT-06-13 Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
-
D. Bolzoni, and S. Etalle, APHRODITE: an Anomaly-based Architecture for False Positive Reduction, Technical Report TR-CTIT-06-13 Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625, 2006.
-
(2006)
-
-
Bolzoni, D.1
Etalle, S.2
-
3
-
-
0344439823
-
-
Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnor, and S. Stolfo, A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, Data Mining for Security App., Kluwer, 2002.
-
(2002)
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, Data Mining for Security App
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnor, L.4
Stolfo, S.5
-
4
-
-
29244471799
-
An Approach for Detecting Self-Propagating Email Using Anomaly Detection
-
Pittsburgh, PA, USA, Sept
-
A. Gupta and R. Sekar, An Approach for Detecting Self-Propagating Email Using Anomaly Detection, 2003 International Symp. on Recent Advances in Intrusion Detection, Pittsburgh, PA, USA, Sept, 2003.
-
(2003)
2003 International Symp. on Recent Advances in Intrusion Detection
-
-
Gupta, A.1
Sekar, R.2
-
5
-
-
33847617890
-
-
M. Hussein, and M. Zulkernine, Intrusion detection aware component-based systems: A specification-based framework, Journal of Systems and Software 80, 5 (May. 2007), pp. 700-710. DOI=http://dx.doi.org/10.1016/j. jss.2006.08.017.
-
M. Hussein, and M. Zulkernine, Intrusion detection aware component-based systems: A specification-based framework, Journal of Systems and Software 80, 5 (May. 2007), pp. 700-710. DOI=http://dx.doi.org/10.1016/j. jss.2006.08.017.
-
-
-
-
6
-
-
33750343827
-
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic
-
Vancouver, BC, Canada
-
O. Kolesnikov, D. Dagon, and W. Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic, in USENIX Security Symposium. 2006: Vancouver, BC, Canada.
-
(2006)
USENIX Security Symposium
-
-
Kolesnikov, O.1
Dagon, D.2
Lee, W.3
-
7
-
-
0036038437
-
Service Specific Anomaly Detection for Network Intrusion Detection
-
ACM Digital Library, Spain, Mar
-
C. Kruegel, T. Toth, and E. Kirda, Service Specific Anomaly Detection for Network Intrusion Detection, Symp. on Applied Computing (SAC), ACM Digital Library, Spain, Mar 2002.
-
(2002)
Symp. on Applied Computing (SAC)
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
8
-
-
84885774862
-
A Framework for Constructing Features and Models for Intrusion Detection Systems
-
November
-
W. Lee and S. Stolfo, A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Trans on Information and System Security, vol.3, no.4, pp. 227-261, November 2000.
-
(2000)
ACM Trans on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
9
-
-
58049104867
-
-
LinkLogger, http://www.linklogger.com/.
-
LinkLogger
-
-
-
10
-
-
0012249167
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, K. Das., The 1999 DARPA Off-Line Intrusion Detection Evaluation, MIT Lincoln Lab Technical Report, 2000.
-
(2000)
MIT Lincoln Lab Technical Report
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
12
-
-
3543072024
-
-
June 2003
-
P. Mell, V. Hu, R. Lippmann, J. Haines, and M. Zissman, An Overview of Issues in Testing Intrusion Detection Systems, June 2003 http://csrc.nist.gov/publications/nistir/index.html.
-
An Overview of Issues in Testing Intrusion Detection Systems
-
-
Mell, P.1
Hu, V.2
Lippmann, R.3
Haines, J.4
Zissman, M.5
-
14
-
-
0002804477
-
Experiences with Emerald to Date
-
Santa Clara, CA, Apr 11-12
-
P.G. Neumann and P.A. Poras, Experiences with Emerald to Date, In Proceedings of the 1st Usenix Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, Apr 11-12, 1999.
-
(1999)
Proceedings of the 1st Usenix Workshop on Intrusion Detection and Network Monitoring
-
-
Neumann, P.G.1
Poras, P.A.2
-
15
-
-
33745436168
-
Real-Time Identification of Anomalous Packet Payloads for Network Intrusion Detection
-
West Point, NY, pp, June
-
N. Nwanze, D. Summerville, V. Skormin, Real-Time Identification of Anomalous Packet Payloads for Network Intrusion Detection, Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, pp. 448-449, June 2005.
-
(2005)
Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop
, pp. 448-449
-
-
Nwanze, N.1
Summerville, D.2
Skormin, V.3
-
16
-
-
34248377875
-
SVision: A novel visual network-anomaly identification technique
-
May
-
I. Onuta, and A. Ghorbani, SVision: A novel visual network-anomaly identification technique, Computers & Security, vol. 26, Issue 3, pp 201-212, May 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 201-212
-
-
Onuta, I.1
Ghorbani, A.2
-
17
-
-
58049118370
-
-
T.H. Ptacek and T. N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc., Jan 1998, http://www.snort.org/idspaper/.
-
T.H. Ptacek and T. N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc., Jan 1998, http://www.snort.org/idspaper/.
-
-
-
-
19
-
-
15944362838
-
Detecting Malicious Codes by the presence of their Gene of Self-Replication, Computer Network Security
-
Springer
-
V. Skormin, D. Summerville, J. Moronski, Detecting Malicious Codes by the presence of their Gene of Self-Replication, Computer Network Security, LNCS, Volume 2776, Springer, 2003.
-
(2003)
LNCS
, vol.2776
-
-
Skormin, V.1
Summerville, D.2
Moronski, J.3
-
20
-
-
58049117873
-
-
Stonesoft Inc, October 1, 2003
-
Stonesoft Inc., Winning the Battle against False Positives, October 1, 2003, http://www.stonesoft.com/files/products/StoneGate/ SGWP_WinningTheBattleAgainstFalsePositives_print.pdf.
-
Winning the Battle against False Positives
-
-
-
21
-
-
15944420843
-
Anomalous Packet Identification for Network Intrusion Detection
-
West Point, NY, pp, June
-
D. Summerville, N. Nwanze, and V. Skormin, Anomalous Packet Identification for Network Intrusion Detection, Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, pp. 60-67, June 2004.
-
(2004)
Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop
, pp. 60-67
-
-
Summerville, D.1
Nwanze, N.2
Skormin, V.3
-
22
-
-
0242456143
-
NATE- Network Analysis of Anomolous Traffic Events, A Low Cost Approach
-
Sept 10-13
-
C. Taylor and J. Alves-Foss, NATE- Network Analysis of Anomolous Traffic Events, A Low Cost Approach, In Proceedings of the NSPW'01, Sept 10-13, 2001, pp. 89-96.
-
(2001)
Proceedings of the NSPW'01
, pp. 89-96
-
-
Taylor, C.1
Alves-Foss, J.2
-
23
-
-
84958963167
-
Accurate Buffer Overflow Detection via Abstract Payload Execution
-
5th Symp on Recent Advances in Intrusion Detection RAID, Springer Verlag, Switzerland, pp, Oct
-
T. Toth and C. Kruegel, Accurate Buffer Overflow Detection via Abstract Payload Execution, 5th Symp on Recent Advances in Intrusion Detection (RAID), LNCS, Springer Verlag, Switzerland, pp. 274-91, Oct 2002.
-
(2002)
LNCS
, pp. 274-291
-
-
Toth, T.1
Kruegel, C.2
-
24
-
-
58049129088
-
-
Viruslist.com, Kaspersky Security Bulletin 2006: Internet Attacks, http://www.viruslist.com/en/analysis?pubid=204791921.
-
Viruslist.com, Kaspersky Security Bulletin 2006: Internet Attacks, http://www.viruslist.com/en/analysis?pubid=204791921.
-
-
-
-
25
-
-
58049112254
-
-
K. Wang and S.J. Stolfo, Anomalous Payload-based Network Intrusion Detection, Columbia University Technical Report, Feb. 2nd, 2004, http://www1.cs.columbia.edu/ids/publications/Payl-AD.02.01.04-final.PDF.
-
K. Wang and S.J. Stolfo, Anomalous Payload-based Network Intrusion Detection, Columbia University Technical Report, Feb. 2nd, 2004, http://www1.cs.columbia.edu/ids/publications/Payl-AD.02.01.04-final.PDF.
-
-
-
-
27
-
-
58049125859
-
-
Online Scanner Top Twenty
-
Viruslist.com, Online Scanner Top Twenty..., http://www.viruslist. com-/en/analysis.
-
Viruslist.com
-
-
-
28
-
-
58049095355
-
-
A. Yee, Making false positives go away, Computerworld, 28/01/2004.
-
A. Yee, Making false positives go away, Computerworld, 28/01/2004.
-
-
-
|