-
1
-
-
85180737978
-
A lightweight tool for detecting web server attacks
-
San Diego, CA, February
-
M. Almgren, H. Debar, and M. Dacier. A lightweight tool for detecting web server attacks. In Proceedings of the ISOC Symposium on Network and Distributed Systems Security, San Diego, CA, February 2000.
-
(2000)
Proceedings of the ISOC Symposium on Network and Distributed Systems Security
-
-
Almgren, M.1
Debar, H.2
Dacier, M.3
-
2
-
-
84947584994
-
Application-integrated data collection for security monitoring
-
LNCS, Davis, CA, October. Springer
-
M. Almgren and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In Proceedings of Recent Advances in Intrusion Detection (RAID), LNCS, pages 22-36, Davis, CA, October 2001. Springer.
-
(2001)
Proceedings of Recent Advances in Intrusion Detection (RAID)
, pp. 22-36
-
-
Almgren, M.1
Lindqvist, U.2
-
3
-
-
8644227174
-
-
Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA- 2001-19, July
-
CERT/CC. "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA- 2001-19, July 2001.
-
(2001)
Code Red Worm
-
-
CERT/CC1
-
4
-
-
33744935097
-
-
Advisory CA- 2002-27, October
-
CERT/CC. Apache/mod ssl Worm. Advisory CA- 2002-27, October 2002.
-
(2002)
Apache/mod Ssl Worm
-
-
CERT/CC1
-
6
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S.T. Eckmann, G. Vigna, and R.A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
8
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Paul Helman and Gunar Liepins. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. In IEEE Transactions on Software Engineering, volume Vol 19, No. 9, pages 886-901, 1993.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
9
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection system
-
March
-
K. Ilgun, R.A. Kemmerer, and P.A. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
10
-
-
0004118981
-
-
Technical report, SRI International, Menlo Park, CA, March
-
H. S. Javitz and A. Valdes. The NIDES Statistical Component Description and Justification. Technical report, SRI International, Menlo Park, CA, March 1994.
-
(1994)
The NIDES Statistical Component Description and Justification
-
-
Javitz, H.S.1
Valdes, A.2
-
12
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
May
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
13
-
-
57349165976
-
-
Internet Draft, draft-koster-robots-00.txt, December
-
M. Koster. A Method for Web Robots Control. Internet Draft, draft-koster-robots-00.txt, December 1996.
-
(1996)
A Method for Web Robots Control
-
-
Koster, M.1
-
14
-
-
84940110274
-
Detecting computer and network misuse with the production-based expert system toolset (P-BEST)
-
Oakland, California, May
-
U. Lindqvist and P.A. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
15
-
-
0004145058
-
Insertion, evasion and denial of service: Eluding network intrusion detection
-
January
-
T.H. Ptacek and T.N. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, January 1998.
-
(1998)
Technical Report, Secure Networks
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
17
-
-
0006062055
-
-
2550 Garcia Ave., Mountain View, CA 94043, December
-
Sun Microsystems, Inc. Installing, Administering, and Using the Basic Security Module. 2550 Garcia Ave., Mountain View, CA 94043, December 1991.
-
(1991)
Installing, Administering, and Using the Basic Security Module
-
-
-
20
-
-
21944435070
-
An approach to sensor correlation
-
Tolouse, France, October
-
A. Valdes and K. Skinner. An Approach to Sensor Correlation. In Proceedings of RAID 2000, Tolouse, France, October 2000.
-
(2000)
Proceedings of RAID 2000
-
-
Valdes, A.1
Skinner, K.2
-
21
-
-
84860434876
-
The STAT tool suite
-
Hilton Head, South Carolina, January. IEEE Computer Society Press
-
G. Vigna, S. Eckmann, and R. Kemmerer. The STAT Tool Suite. In Proceedings of DISCEX 2000, Hilton Head, South Carolina, January 2000. IEEE Computer Society Press.
-
(2000)
Proceedings of DISCEX 2000
-
-
Vigna, G.1
Eckmann, S.2
Kemmerer, R.3
-
22
-
-
84947584002
-
Designing a web of highly-configurable intrusion detection sensors
-
W. Lee, L. Me, and A. Wespi, editors, Davis, CA, October. Springer-Verlag
-
th International Symposiun on Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 69-84, Davis, CA, October 2001. Springer-Verlag.
-
(2001)
th International Symposiun on Recent Advances in Intrusion Detection (RAID 2001), Volume 2212 of LNCS
, pp. 69-84
-
-
Vigna, G.1
Kemmerer, R.A.2
Blix, P.3
|