-
1
-
-
66249106228
-
Technical Report XII
-
Trends for July-December 2007, Symantec Corporation April
-
Turner, D., Fossi, M., Johnson, E., Mark, T., Blackbird, J., Entwise, S., Low, M.K., McKinney, D., Wueest, C.: Symantec Global Internet Security Threat Report - Trends for July-December 2007. Technical Report XII, Symantec Corporation (April 2008)
-
(2008)
Symantec Global Internet Security Threat Report
-
-
Turner, D.1
Fossi, M.2
Johnson, E.3
Mark, T.4
Blackbird, J.5
Entwise, S.6
Low, M.K.7
McKinney, D.8
Wueest, C.9
-
4
-
-
2942533003
-
SAD: Web session anomaly detection based on parameter estimation
-
Cho, S., Cha, S.: SAD: web session anomaly detection based on parameter estimation. In: Computers & Security, vol. 23, pp. 312-319 (2004)
-
(2004)
Computers & Security
, vol.23
, pp. 312-319
-
-
Cho, S.1
Cha, S.2
-
5
-
-
18844395404
-
A Multi-model Approach to the Detection of Web-based Attacks
-
Kruegel, C., Robertson, W., Vigna, G.: A Multi-model Approach to the Detection of Web-based Attacks. Journal of Computer Networks 48(5), 717-738 (2005)
-
(2005)
Journal of Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
6
-
-
83455223163
-
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
-
San Diego, CA, USA February
-
Robertson, W., Vigna, G., Kruegel, C., Kemmerer, R.A.: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, USA (February 2006)
-
(2006)
Proceedings of the Network and Distributed System Security Symposium (NDSS
-
-
Robertson, W.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
7
-
-
57849112746
-
Modeling Unknown Web Attacks in Network Anomaly Detection
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Guangmin, L.: Modeling Unknown Web Attacks in Network Anomaly Detection. In: Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT 2008), Washington, DC, USA, pp. 112-116. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT
, pp. 112-116
-
-
Guangmin, L.1
-
8
-
-
76649144648
-
-
Zanero, S., Criscione, C.: Masibty: A Web Application Firewall based on Anomaly Detection. In: DeepSec - In-depth security conference (November 2008)
-
Zanero, S., Criscione, C.: Masibty: A Web Application Firewall based on Anomaly Detection. In: DeepSec - In-depth security conference (November 2008)
-
-
-
-
9
-
-
84868164585
-
-
Inc, Citrix Application Firewall January
-
Citrix Systems, Inc.: Citrix Application Firewall (January 2009), http://www.citrix.com/English/PS2/products/product.asp?contentID=25636
-
(2009)
-
-
Systems, C.1
-
10
-
-
84868163869
-
-
F5 Networks, Inc, January 2009
-
F5 Networks, Inc.: BIG-IP Application Security Manager (January 2009), http://www.f5.com/products/big-ip/product-modules/application-security-manager. html
-
BIG-IP Application Security Manager
-
-
-
11
-
-
84868177005
-
-
Breach Security, Inc, January 2009
-
Breach Security, Inc.: Breach WebDefend (January 2009), http://www.breach.com/products/webdefend.html
-
Breach WebDefend
-
-
-
13
-
-
60649095147
-
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
-
Anaheim, CA, USA December
-
Frias-Martinez, V., Stolfo, S.J., Keromytis, A.D.: Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, USA (December 2008)
-
(2008)
Proceedings of the Annual Computer Security Applications Conference (ACSAC
-
-
Frias-Martinez, V.1
Stolfo, S.J.2
Keromytis, A.D.3
-
14
-
-
76649133925
-
Kernel Methods for Anomaly Detection and Noise Elimination
-
Mexico City, Mexico, pp
-
Escalante, H.J., Fuentes, O.: Kernel Methods for Anomaly Detection and Noise Elimination. In: Proceedings of the International Conference on Computing (CORE 2006), Mexico City, Mexico, pp. 69-80 (2006)
-
(2006)
Proceedings of the International Conference on Computing (CORE
, pp. 69-80
-
-
Escalante, H.J.1
Fuentes, O.2
-
15
-
-
62849113350
-
Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems
-
Austin, TX, USA, pp, IEEE Computer Society, Los Alamitos
-
Kim, S.i., Nwanze, N.: Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems. In: Proceedings of the Performance, Computing and Communications Conference (IPCCC 2008), Austin, TX, USA, pp. 517-523. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the Performance, Computing and Communications Conference (IPCCC
, pp. 517-523
-
-
Kim, S.I.1
Nwanze, N.2
-
16
-
-
50249170401
-
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
-
Oakland, CA, USA, pp, IEEE Computer Society, Los Alamitos
-
Cretu, G.F., Stavrou, A., Locasto, M.E., Stolfo, S.J., Keromytis, A.D.: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), Oakland, CA, USA, pp. 81-95. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
17
-
-
76649099342
-
-
Song, Y., Stolfo, S., Keromytis, A.: Spectrogram: A Mixture-of-Markov- Chains Model for Anomaly Detection in Web Traffic. In: Proc. of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
-
Song, Y., Stolfo, S., Keromytis, A.: Spectrogram: A Mixture-of-Markov- Chains Model for Anomaly Detection in Web Traffic. In: Proc. of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
-
-
-
-
19
-
-
37749050180
-
Dynamic weighted majority: An ensemble method for drifting concepts
-
Kolter, J., Maloof, M.: Dynamic weighted majority: An ensemble method for drifting concepts. The Journal of Machine Learning Research 8, 2755-2790 (2007)
-
(2007)
The Journal of Machine Learning Research
, vol.8
, pp. 2755-2790
-
-
Kolter, J.1
Maloof, M.2
-
23
-
-
84885774862
-
A Framework for Constructing Features and Models for Intrusion Detection Systems
-
Lee, W., Stolfo, S.J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security 3(4), 227-261 (2000)
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
24
-
-
33745201000
-
Anomaly system call detection
-
Mutz, D., Valeur, F., Vigna, G., Kruegel, C.: Anomaly system call detection. ACM Transactions on Information and System Security 9(1), 61-93 (2006)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
25
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Oakland, CA, USA, pp, IEEE Computer Society, Los Alamitos
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 1996), Oakland, CA, USA, pp. 120-128. IEEE Computer Society, Los Alamitos (1996)
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy (S&P
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
26
-
-
0034836394
-
Intrusion Detection via Static Analysis
-
Oakland, CA, USA, pp, IEEE Computer Society, Los Alamitos
-
Wagner, D., Dean, D.: Intrusion Detection via Static Analysis. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), Oakland, CA, USA, pp. 156-168. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy (S&P
, pp. 156-168
-
-
Wagner, D.1
Dean, D.2
-
27
-
-
78149460823
-
Detecting intrusions through system call sequence and argument analysis
-
5555
-
Maggi, F., Matteucci, M., Zanero, S.: Detecting intrusions through system call sequence and argument analysis. IEEE Transactions on Dependable and Secure Computing 99(1) (5555)
-
IEEE Transactions on Dependable and Secure Computing
, vol.99
, Issue.1
-
-
Maggi, F.1
Matteucci, M.2
Zanero, S.3
-
28
-
-
35048885009
-
-
Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 203-222. Springer, Heidelberg (2004)
-
Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
-
-
-
-
29
-
-
33750335757
-
-
Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, 4219, pp. 226-248. Springer, Heidelberg (2006)
-
Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226-248. Springer, Heidelberg (2006)
-
-
-
-
30
-
-
33745165284
-
-
Zanero, S.: Analyzing TCP traffic patterns using self organizing maps. In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, 3617, pp. 83-90. Springer, Heidelberg (2005)
-
Zanero, S.: Analyzing TCP traffic patterns using self organizing maps. In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 83-90. Springer, Heidelberg (2005)
-
-
-
-
31
-
-
84944737204
-
Bayesian Event Classification for Intrusion Detection
-
Las Vegas, NV, USA. IEEE Computer Society, Los Alamitos
-
Kruegel, C., Mutz, D., Robertson, W., Valeur, F.: Bayesian Event Classification for Intrusion Detection. In: Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), Las Vegas, NV, USA. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
|