-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
J. P, Anderson, Apr
-
J. P. Anderson, "Computer Security Threat Monitoring and Surveillance", technical report, J. P. Anderson, Apr. 1980.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
2
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A Sense of Self for Unix Processes", Proc. IEEE Symp. Security and Privacy (S&P), 1996.
-
(1996)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
3
-
-
0142222738
-
Detection and classification of intrusion and faults using sequences of system calls
-
J. B. D. Cabrera, L. Lewis, and R. Mehara, "Detection and Classification of Intrusion and Faults Using Sequences of System Calls", ACM SIGMOD Record, vol. 30, no. 4, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
-
-
Cabrera, J.B.D.1
Lewis, L.2
Mehara, R.3
-
4
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls", J. Computer Security, vol. 6, pp. 151-180, 1998.
-
(1998)
J. Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
6
-
-
85149612939
-
Fast effective rule induction
-
A. Prieditis and S. Russell, eds., July
-
W. W. Cohen, "Fast Effective Rule Induction", Proc. 12th Int'l Conf. Machine Learning (ICML'95), A. Prieditis and S. Russell, eds., pp. 115-123, July 1995.
-
(1995)
Proc. 12th Int'l Conf. Machine Learning (ICML'95)
, pp. 115-123
-
-
Cohen, W.W.1
-
8
-
-
84969506768
-
Applications of hidden markov models to detecting multi-stage network attacks
-
D. Ourston, S. Matzner, W. Stump, and B. Hopkins, "Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks", Proc. 36th Ann. Hawaii Int'l Conf. System Sciences (HICSS-36'03), p. 334, 2003.
-
(2003)
Proc. 36th Ann. Hawaii Int'l Conf. System Sciences (HICSS-36'03)
, pp. 334
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
9
-
-
0034829265
-
Markov chains, classifiers, and intrusion detection
-
S. Jha, K. Tan, and R. A. Maxion, "Markov Chains, Classifiers, and Intrusion Detection", Proc. 14th IEEE Workshop Computer Security Foundations (CSFW'01), p. 206, 2001.
-
(2001)
Proc. 14th IEEE Workshop Computer Security Foundations (CSFW'01)
, pp. 206
-
-
Jha, S.1
Tan, K.2
Maxion, R.A.3
-
10
-
-
84882800335
-
Simple, state-based approaches to program-based anomaly detection
-
C. C. Michael and A. Ghosh, "Simple, State-Based Approaches to Program-Based Anomaly Detection", ACM Trans. Information and System Security, vol. 5, no. 3, pp. 203-237, 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.C.1
Ghosh, A.2
-
11
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, "A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors", Proc. IEEE Symp. Security and Privacy (S&P'01), pp. 144-155, 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy (S&P'01)
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
13
-
-
33745644031
-
Environment-sensitive intrusion detection
-
J. T. Giffin, D. Dagon, S. Jha, W. Lee, and B. P. Miller, "Environment-Sensitive Intrusion Detection", Proc. Eighth Int'l Symp. Recent Advances in Intrusion Detection (RAID'05), pp. 185-206, 2005.
-
(2005)
Proc. Eighth Int'l Symp. Recent Advances in Intrusion Detection (RAID'05)
, pp. 185-206
-
-
Giffin, J.T.1
Dagon, D.2
Jha, S.3
Lee, W.4
Miller, B.P.5
-
14
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
Jan
-
D.-Y. Yeung and Y. Ding, "Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models", Pattern Recognition, vol. 36, pp. 229-243, Jan. 2003.
-
(2003)
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.-Y.1
Ding, Y.2
-
15
-
-
26444598206
-
On the detection of anomalous system call arguments
-
Oct
-
C. Kruegel, D. Mutz, F. Valeur, and G. Vigna, "On the Detection of Anomalous System Call Arguments", Proc. European Symp. Research in Computer Security (ESORICS'03), Oct. 2003.
-
(2003)
Proc. European Symp. Research in Computer Security (ESORICS'03)
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
19
-
-
0023294428
-
An intrusion-detection model
-
Feb
-
D. E. Denning, "An Intrusion-Detection Model", IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
20
-
-
0242572726
-
Measuring system normality
-
M. Burgess, H. Haugerud, S. Straumsnes, and T. Reitan, "Measuring System Normality", ACM Trans. Computer Systems, vol. 20, no. 2, pp. 125-160, 2002.
-
(2002)
ACM Trans. Computer Systems
, vol.20
, Issue.2
, pp. 125-160
-
-
Burgess, M.1
Haugerud, H.2
Straumsnes, S.3
Reitan, T.4
-
21
-
-
0035271352
-
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
-
N. Ye and Q. Chen, "An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems", Quality and Reliability Eng. Int'l, vol. 17, no. 2, pp. 105-112, 2001.
-
(2001)
Quality and Reliability Eng. Int'l
, vol.17
, Issue.2
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
24
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
A. K. Gosh, J. Wanken, and F. Charron, "Detecting Anomalous and Unknown Intrusions against Programs", Proc. 14th Ann. Computer Security Applications Conf. (ACSAC'98), p. 259, 1998.
-
(1998)
Proc. 14th Ann. Computer Security Applications Conf. (ACSAC'98)
, pp. 259
-
-
Gosh, A.K.1
Wanken, J.2
Charron, F.3
-
25
-
-
32444438838
-
A comparative analysis of artificial immune network models
-
J. C. Galeano, A. Veloza-Suan, and F. A. Gonz?lez, "A Comparative Analysis of Artificial Immune Network Models", Proc. 2005 Conf. Genetic and Evolutionary Computation (GECCO'05), pp. 361-368, 2005.
-
(2005)
Proc. 2005 Conf. Genetic and Evolutionary Computation (GECCO'05)
, pp. 361-368
-
-
Galeano, J.C.1
Veloza-Suan, A.2
Gonzlez, F.A.3
-
26
-
-
0031258214
-
Computer immunology
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer Immunology", Comm. ACM, vol. 40, no. 10, pp. 88-96, 1997.
-
(1997)
Comm. ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
27
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
C. Ko, G. Fink, and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring", Proc. 10th Ann. Computer Security Applications Conf. (ACSAC'94), pp. 134-144, 1994.
-
(1994)
Proc. 10th Ann. Computer Security Applications Conf. (ACSAC'94)
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
28
-
-
0002774999
-
Learning patterns from unix process execution traces for intrusion detection
-
W. Lee, S. J. Stolfo, and P. K. Chan, "Learning Patterns from Unix Process Execution Traces for Intrusion Detection", Proc. AAAI97 Workshop AI Approaches to Fraud Detection and Risk Management, pp. 50-56, http://citeseer.ist.psu.edu/lee97learning.html, 1997.
-
(1997)
Proc. AAAI97 Workshop AI Approaches to Fraud Detection and Risk Management
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
-
29
-
-
0142253851
-
Mining system audit data: Opportunities and challenges
-
W. Lee and W. Fan, "Mining System Audit Data: Opportunities and Challenges", ACM SIGMOD Record, vol. 30, no. 4, pp. 35-44, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 35-44
-
-
Lee, W.1
Fan, W.2
-
30
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. A. Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models", Proc. IEEE Symp. Security and Privacy (S&P'99), pp. 133-145, 1999.
-
(1999)
Proc. IEEE Symp. Security and Privacy (S&P'99)
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.A.3
-
31
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-Nonself Discrimination in a Computer", Proc. IEEE Symp. Security and Privacy (S&P'94), p. 202, 1994.
-
(1994)
Proc. IEEE Symp. Security and Privacy (S&P'94)
, pp. 202
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
34
-
-
33745201000
-
Anomalous system call detection
-
D. Mutz, F. Valeur, G. Vigna, and C. Kruegel, "Anomalous System Call Detection", ACM Trans. Information and System Security, vol. 9, no. 1, pp. 61-93, 2006.
-
(2006)
ACM Trans. Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
37
-
-
84956982801
-
Learning fingerprints for a database intrusion detection system
-
S. Y. Lee, W. L. Low, and P. Y. Wong, "Learning Fingerprints for a Database Intrusion Detection System", Proc. Seventh European Symp. Research in Computer Security (ESORICS'02), pp. 264-280, 2002.
-
(2002)
Proc. Seventh European Symp. Research in Computer Security (ESORICS'02)
, pp. 264-280
-
-
Lee, S.Y.1
Low, W.L.2
Wong, P.Y.3
-
38
-
-
78149426851
-
-
LibAnomaly
-
LibAnomaly, http://www.cs.ucsb.edu/~rsg/libAnomaly, 2008.
-
(2008)
-
-
-
41
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition", Proc. IEEE, vol. 77, pp. 257-286, 1989.
-
(1989)
Proc. IEEE
, vol.77
, pp. 257-286
-
-
Rabiner, L.R.1
-
43
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks, vol. 34, no. 4, pp. 579-595, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
44
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Trans. Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
46
-
-
78149418482
-
-
Shmoo Group
-
Shmoo Group, Capture the CTF, http://cctf.shmoo.com 2008.
-
(2008)
Capture the CTF
-
-
|