-
1
-
-
0038386881
-
Efficient Packet Monitoring for Network Management
-
+02] April
-
+02] K. G. Anagnostakis, S. Ioannidis, S. Miltchev, J. Ioannidis, Michael B. Greenwald, and J. M. Smith. Efficient Packet Monitoring for Network Management. In Proceedings of IFIP/IEEE Network Operations and Management Symposium (NOMS) 2002, April 2002.
-
(2002)
Proceedings of IFIP/IEEE Network Operations and Management Symposium (NOMS) 2002
-
-
Anagnostakis, K. G.1
Ioannidis, S.2
Miltchev, S.3
Ioannidis, J.4
Greenwald, Michael B.5
Smith, J. M.6
-
2
-
-
0003482133
-
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response
-
[Amo99] Intrusion Net Books
-
[Amo99] Edward Amoroso. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Intrusion Net Books, 1999.
-
(1999)
-
-
Amoroso, Edward1
-
3
-
-
0033281215
-
The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection
-
[Axe99] pages
-
[Axe99] Stefan Axelsson. The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In ACM Conference on Computer and Communications Security, pages 1–7, 1999.
-
(1999)
ACM Conference on Computer and Communications Security
, pp. 1-7
-
-
Axelsson, Stefan1
-
4
-
-
0034823003
-
A trend analysis of exploitations
-
[BAMF01] Francis M. Titsworth, editor, pages Los Alamitos, CA, May 14–16 IEEE Computer Society
-
[BAMF01] H. K. Browne, W. A. Arbaugh, J. McHugh, and W. L. Fithen. A trend analysis of exploitations. In Francis M. Titsworth, editor, Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 214–231, Los Alamitos, CA, May 14–16 2001. IEEE Computer Society.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 214-231
-
-
Browne, H. K.1
Arbaugh, W. A.2
McHugh, J.3
Fithen, W. L.4
-
5
-
-
84941157750
-
IBAN: Intrusion Blocker based on Active Networks
-
[ea]
-
[ea] W. La Cholter et al. IBAN: Intrusion Blocker based on Active Networks. In Proc. of Dance 2002.
-
(2002)
Proc. of Dance
-
-
La Cholter, W.1
-
6
-
-
84941153560
-
Active Network Based DDoS Defense
-
[ea02]
-
[ea02] Dan Sterne et al. Active Network Based DDoS Defense. In Proc. of Dance 2002, 2002.
-
(2002)
Proc. of Dance 2002
-
-
Sterne, Dan1
-
8
-
-
11144289911
-
FIDRAN: A flexible Intrusion Detection and Response Framework for Active Networks
-
[HJS03] accepted for publication
-
[HJS03] A. Hess, M. Jung, and G. Schäfer. FIDRAN: A flexible Intrusion Detection and Response Framework for Active Networks. In Symposium on Computers and Communications (ISCC’2003), 2003. accepted for publication.
-
(2003)
Symposium on Computers and Communications (ISCC’2003)
-
-
Hess, A.1
Jung, M.2
Schäfer, G.3
-
9
-
-
4143056247
-
A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment
-
[HS03] Leipzig, Germany, February accepted for publication
-
[HS03] A. Hess and G. Schaefer. A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment. In Proc. of Kommunikation in Verteilten Systemen (KiVS 2003), Leipzig, Germany, February 2003. accepted for publication.
-
(2003)
Proc. of Kommunikation in Verteilten Systemen (KiVS 2003)
-
-
Hess, A.1
Schaefer, G.2
-
10
-
-
84883877347
-
A dynamic and flexible Access Control and Resource Monitoring Mechanism for Active Nodes
-
+02] pages New York, USA, June
-
+02] A. Hess, M. Schoeller, G. Schaefer, M. Zitterbart, and A. Wolisz. A dynamic and flexible Access Control and Resource Monitoring Mechanism for Active Nodes. In Short Paper Proc. of OpenArch 2002, pages 11–16, New York, USA, June 2002.
-
(2002)
Short Paper Proc. of OpenArch 2002
, pp. 11-16
-
-
Hess, A.1
Schoeller, M.2
Schaefer, G.3
Zitterbart, M.4
Wolisz, A.5
-
11
-
-
85135273663
-
-
[ipe] IPerf
-
[ipe] IPerf. http://dast.nlanr.net/Projects/Iperf/.
-
-
-
-
12
-
-
84962260018
-
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation
-
+00] Los Alamitos, CA, IEEE Computer Society Press
-
+00] Richard Lippmann, David Fried, Isaac Graf, Joshua Haines, Kristopher Kendall, David McClung, Dan Weber, Seth Webster, Dan Wyschogrod, Robert Cunningham, and Marc Zissman. Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition, Los Alamitos, CA, 2000. IEEE Computer Society Press.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
-
-
Lippmann, Richard1
Fried, David2
Graf, Isaac3
Haines, Joshua4
Kendall, Kristopher5
McClung, David6
Weber, Dan7
Webster, Seth8
Wyschogrod, Dan9
Cunningham, Robert10
Zissman, Marc11
-
13
-
-
85135254017
-
-
[nim]
-
[nim] Nimda Attack. http://www.cert.org/advisories/CA-2001-26.html.
-
Nimda Attack
-
-
-
20
-
-
85135268264
-
-
[snoa]
-
[snoa] Snort. http://www.snort.org.
-
Snort
-
-
-
21
-
-
84883699276
-
-
[snob]
-
[snob] Snort-Inline. http://www.honeynet.org/papers/honeynet/tools/.
-
Snort-Inline
-
-
|