-
1
-
-
85027126771
-
-
Microsoft security bulletin MS01-033, Nov. 2003
-
"Microsoft security bulletin MS01-033," Nov. 2003. http://www.microsoft.com/technet/security/bulletin/MS01-033.mspx
-
-
-
-
3
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
Portland, USA, Aug
-
H.J. Wang, C. Guo, D.R. Simon, and A. Zugenmaier, "Shield: Vulnerability-driven network filters for preventing known vulnerability exploits," Proc. ACM SIGCOMM 2004, pp. 193-204, Portland, USA, Aug. 2004.
-
(2004)
Proc. ACM SIGCOMM
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
4
-
-
14844324904
-
Enhancing byte-level network intrusion detection signatures with context
-
Washington, USA, Oct
-
R. Sommer and V. Paxson, "Enhancing byte-level network intrusion detection signatures with context," Proc. 10th ACM Conf. on Computer and Communications Security (CCS '03), pp. 262-271, Washington, USA, Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. on Computer and Communications Security (CCS '03)
, pp. 262-271
-
-
Sommer, R.1
Paxson, V.2
-
5
-
-
85090433665
-
Snort - lightweight intrusion detection for networks
-
99, pp, Seattle, USA, Nov
-
M. Roesch, "Snort - lightweight intrusion detection for networks," Proc. 13th Systems Administration Conf. (LISA '99), pp. 229-238, Seattle, USA, Nov. 1999.
-
(1999)
Proc. 13th Systems Administration Conf. (LISA
, pp. 229-238
-
-
Roesch, M.1
-
6
-
-
62349108537
-
A stateful intrusion detection system for world-wide web servers
-
Las Vegas, USA, Dec
-
G. Vigna, W. Robertson, V. Kher, and R.A. Kemmerer, "A stateful intrusion detection system for world-wide web servers," Proc. 19th Annual Computer Security Applications Conf. (ACSAC '03), pp. 34-43, Las Vegas, USA, Dec. 2003.
-
(2003)
Proc. 19th Annual Computer Security Applications Conf. (ACSAC '03)
, pp. 34-43
-
-
Vigna, G.1
Robertson, W.2
Kher, V.3
Kemmerer, R.A.4
-
7
-
-
14844319067
-
Anomaly detection of Web-based attacks
-
Washington, USA, Oct
-
C. Kruegel and G. Vigna, "Anomaly detection of Web-based attacks," Proc. 10th ACM Conf. on Computer and Communications Security (CCS '03), pp. 251-261, Washington, USA, Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. on Computer and Communications Security (CCS '03)
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
8
-
-
85027153705
-
-
Check Point Software Technologies Ltd
-
Check Point Software Technologies Ltd., Application Intelligence. http://www.checkpoint.com/products/downloads/applicationintelligence-whitepaper. pdf
-
Application Intelligence
-
-
-
9
-
-
85027160181
-
-
McAfee, Inc
-
McAfee, Inc., IntruShield Network IPS Appliances. http://www.mcafee.com/ japan/products/pdf/IntruVert-NextGenerationIDSWhitePaper.en.pdf
-
IntruShield Network IPS Appliances
-
-
-
10
-
-
0033295259
-
Bro: A system for detecting network intruders in realtime
-
Comput. Netw, Dec
-
V. Paxson, "Bro: A system for detecting network intruders in realtime," Comput. Netw., vol. 31, no. 23-24, pp. 2435-2463, Dec. 1999.
-
(1999)
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
11
-
-
70449121907
-
Rubust TCP stream reassembly in the presence of adversaries
-
Baltimore, USA, Aug
-
S. Dharmapurikar and V. Paxson, "Rubust TCP stream reassembly in the presence of adversaries," Proc. 14th USENIX Security Symp., pp. 65-80, Baltimore, USA, Aug. 2005.
-
(2005)
Proc. 14th USENIX Security Symp
, pp. 65-80
-
-
Dharmapurikar, S.1
Paxson, V.2
-
13
-
-
85027139026
-
-
CERT advisory CA-2002-27 Apache/mod-ssl worm, Oct. 2002. http://www.cert.org/advisories/CA-2002-27.html
-
"CERT advisory CA-2002-27 Apache/mod-ssl worm," Oct. 2002. http://www.cert.org/advisories/CA-2002-27.html
-
-
-
-
15
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Tech. Rep, Secure Networks, Inc, Jan
-
T.H. Ptacek and T.N. Newsham, "Insertion, evasion, and denial of service: Eluding network intrusion detection," Tech. Rep., Secure Networks, Inc., Jan. 1998.
-
(1998)
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
16
-
-
0033890508
-
Transport and application protocol scrubbing
-
Tel-Aviv, Israel, March
-
G.R. Malan, D. Watson, F. Jahanian, and P. Howell, "Transport and application protocol scrubbing," Proc. IEEE INFOCOM 2000, pp. 1381-1390, Tel-Aviv, Israel, March 2000.
-
(2000)
Proc. IEEE INFOCOM
, pp. 1381-1390
-
-
Malan, G.R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
17
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Washington, USA, Aug
-
M. Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics," Proc. 10th USENIX Security Symposium, Washington, USA, Aug. 2001.
-
(2001)
Proc. 10th USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
18
-
-
0038825042
-
Active mapping: Resisting nids evasion without altering traffic
-
Oakland, USA, May
-
U. Shankar and V. Paxson, "Active mapping: Resisting nids evasion without altering traffic," Proc. 2003 IEEE Symp. on Security and Privacy (S&P '03), pp. 44-61, Oakland, USA, May 2003.
-
(2003)
Proc. 2003 IEEE Symp. on Security and Privacy (S&P '03)
, pp. 44-61
-
-
Shankar, U.1
Paxson, V.2
-
19
-
-
85027110695
-
-
K. Kono, T. Shinagawa, and M.R. Kabir, Improving internet server security by filtering on tcp streams, IPSJ Trans. Advanced Computing Systems, 46, no. SIG4 (ACS 9), pp. 33-44, March 2005.
-
K. Kono, T. Shinagawa, and M.R. Kabir, "Improving internet server security by filtering on tcp streams," IPSJ Trans. Advanced Computing Systems, vol. 46, no. SIG4 (ACS 9), pp. 33-44, March 2005.
-
-
-
-
20
-
-
85027169765
-
-
Mindcraft, Inc
-
Mindcraft, Inc., "WebStone." http://www.mindcraft.com/webstone/
-
WebStone
-
-
-
21
-
-
1542330212
-
Characteristics of fragmented ip traffic on internet links
-
San Francisco, USA, Nov
-
C. Shannon, D. Moore, and kxlaffy, "Characteristics of fragmented ip traffic on internet links," Proc. 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 83-97, San Francisco, USA, Nov. 2001.
-
(2001)
Proc. 1st ACM SIGCOMM Workshop on Internet Measurement
, pp. 83-97
-
-
Shannon, C.1
Moore, D.2
kxlaffy3
-
23
-
-
83455223163
-
Using generalization and characterization techniques in the anomaly-based detection of web attacks
-
San Diego, USA, Feb
-
W. Robertson, G. Vigna, C. Kruegel, and R.A. Kemmerer, "Using generalization and characterization techniques in the anomaly-based detection of web attacks," Proc. 13th Network and Distributed System Security Symp. (NDSS '06), San Diego, USA, Feb. 2006.
-
(2006)
Proc. 13th Network and Distributed System Security Symp. (NDSS '06)
-
-
Robertson, W.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
24
-
-
21644481499
-
A serial combination of anomaly and misuse idses applied to http traffic
-
Tucson, USA, Dec
-
E. Tombini, H. Debar, L. Me, and M. Ducasse, "A serial combination of anomaly and misuse idses applied to http traffic," Proc. 20th Annual Computer Security Applications Conf. (ACSAC '04), pp. 428-437, Tucson, USA, Dec. 2004.
-
(2004)
Proc. 20th Annual Computer Security Applications Conf. (ACSAC '04)
, pp. 428-437
-
-
Tombini, E.1
Debar, H.2
Me, L.3
Ducasse, M.4
-
25
-
-
68249133072
-
TCP-Splitter: A TCP/IP flow monitor in reconfigurable hardware
-
Stanford, USA, Aug
-
D.V. Schuehler and J.W. Lockwood, "TCP-Splitter: A TCP/IP flow monitor in reconfigurable hardware," Proc. 10th on High Performance Interconnects Hot Interconnects (HotI '02), pp. 127-131, Stanford, USA, Aug. 2002.
-
(2002)
Proc. 10th on High Performance Interconnects Hot Interconnects (HotI '02)
, pp. 127-131
-
-
Schuehler, D.V.1
Lockwood, J.W.2
-
26
-
-
0037225622
-
TCP Splitter: A TCP/IP flow monitor in reconfigurable hardware
-
Jan
-
D.V. Schuehler and J.W. Lockwood, "TCP Splitter: A TCP/IP flow monitor in reconfigurable hardware," IEEE Micro, vol. 23, no. 1, pp. 54-59, Jan. 2003.
-
(2003)
IEEE Micro
, vol.23
, Issue.1
, pp. 54-59
-
-
Schuehler, D.V.1
Lockwood, J.W.2
-
27
-
-
84882798973
-
A hardware platform for network intrusion detection and prevention
-
Madrid, Spain, Feb
-
C. Clark, W. Lee, D. Schimmel, D. Contis, M. Koné, and A. Thomas, "A hardware platform for network intrusion detection and prevention," Proc. 3rd Workshop on Network Processors & Applications (NP3), Madrid, Spain, Feb. 2004.
-
(2004)
Proc. 3rd Workshop on Network Processors & Applications (NP3)
-
-
Clark, C.1
Lee, W.2
Schimmel, D.3
Contis, D.4
Koné, M.5
Thomas, A.6
-
28
-
-
32844469998
-
An active splitter architecture for intrusion detection and prevention
-
Jan
-
K. Xinidis, I. Charitakis, S. Antonatos, K.G. Anagnostakis, and E.P. Markatos, "An active splitter architecture for intrusion detection and prevention," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 1, pp. 31-44, Jan. 2006.
-
(2006)
IEEE Trans. Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 31-44
-
-
Xinidis, K.1
Charitakis, I.2
Antonatos, S.3
Anagnostakis, K.G.4
Markatos, E.P.5
-
29
-
-
84942857445
-
Exploiting reconfigurable hardware for network security
-
Napa, USA, April
-
S. Li, J. Torresen, and O. Søråsen, "Exploiting reconfigurable hardware for network security," Proc. 11th IEEE Symp. on Field-Programmable Custom Computing Machines (FCCM '03), pp. 292-293, Napa, USA, April 2003.
-
(2003)
Proc. 11th IEEE Symp. on Field-Programmable Custom Computing Machines (FCCM '03)
, pp. 292-293
-
-
Li, S.1
Torresen, J.2
Søråsen, O.3
-
30
-
-
85027129821
-
-
The NSS Group
-
The NSS Group. http://www.nss.co.uk/
-
-
-
-
31
-
-
85027151195
-
-
Symantec Corporation
-
Symantec Corporation. http://www.symantec.com/
-
-
-
-
32
-
-
85027094899
-
-
Cisco Systems, Inc
-
Cisco Systems, Inc. http://www.cisco.com/
-
-
-
-
33
-
-
85027138010
-
-
Juniper Networks, Inc
-
Juniper Networks, Inc. http://www.juniper.net/
-
-
-
-
34
-
-
85027185641
-
-
Westline Security Ltd
-
Westline Security Ltd. http://www.west-line.net/
-
-
-
|