-
1
-
-
10444238508
-
On the fly pattern matching for intrusion detection with snort
-
Abbes, T., Bouhoula, A. and Rusinowitch, M. (2004) 'On the fly pattern matching for intrusion detection with snort', Annals of Telecommunications, Vol. 59, Nos. 9-10, pp.941-967.
-
(2004)
Annals of Telecommunications
, vol.59
, Issue.9-10
, pp. 941-967
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
2
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
Aho, A. and Corasick, M. (1975) 'Efficient string matching: an aid to bibliographic search', Communications of the ACM, Vol. 18, No. 6, pp.333-340.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.1
Corasick, M.2
-
3
-
-
0004053867
-
-
4th ed., pub-OR, 981 Chestnut Street, Newton, MA 02164, USA, Covers BIND 9
-
Albitz, P. and Liu, C. (2001) DNS and BIND, 4th ed., pub-OR, 981 Chestnut Street, Newton, MA 02164, USA, Covers BIND 9.
-
(2001)
DNS and BIND
-
-
Albitz, P.1
Liu, C.2
-
4
-
-
84904280510
-
E2xB: A domain-specific string matching algorithm for intrusion detection
-
Anagnostakis, K.G., Markatos, E.P., Antonatos, S. and Polychronakis, M. (2003) 'E2xB: a domain-specific string matching algorithm for intrusion detection', Proceedings of the 18th IFIP International Information Security Conference (SEC2003), pp.217-228.
-
(2003)
Proceedings of the 18th IFIP International Information Security Conference (SEC2003)
, pp. 217-228
-
-
Anagnostakis, K.G.1
Markatos, E.P.2
Antonatos, S.3
Polychronakis, M.4
-
5
-
-
0017547820
-
A fast string searching algorithm
-
Boyer, R.S. and Moore, J.S. (1977) 'A fast string searching algorithm', Communications of the ACM, Vol. 20, No. 10, pp.762-772.
-
(1977)
Communications of the ACM
, vol.20
, Issue.10
, pp. 762-772
-
-
Boyer, R.S.1
Moore, J.S.2
-
6
-
-
84964497101
-
Towards faster string matching for intrusion detection or exceeding the speed of snort
-
Coit, C., Staniford, S. and McAlerney, J. (2001) 'Towards faster string matching for intrusion detection or exceeding the speed of snort', DARPA Information Survivability Conference and Exposition, Vol. 1, p.0367.
-
(2001)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 0367
-
-
Coit, C.1
Staniford, S.2
McAlerney, J.3
-
7
-
-
0033609581
-
Fast practical multi-pattern matching
-
Crochemore, M., Czumaj, A., Ga̧sieniec, L., Lecroq, T., Plandowski, T. and Rytter, W. (1999) 'Fast practical multi-pattern matching', Information Processing Letters, Vol. 71, pp.3-4.
-
(1999)
Information Processing Letters
, vol.71
, pp. 3-4
-
-
Crochemore, M.1
Czumaj, A.2
Ga̧sieniec, L.3
Lecroq, T.4
Plandowski, T.5
Rytter, W.6
-
8
-
-
0004189992
-
-
Oxford University Press, New Yorksommer, ISBN 0-19-508609-0
-
Crochemore, M. and Rytter, W. (1994) Text Algorithms, Oxford University Press, New Yorksommer, ISBN 0-19-508609-0.
-
(1994)
Text Algorithms
-
-
Crochemore, M.1
Rytter, W.2
-
9
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
Vancouver, BC, Canada, USENIX Association, Berkeley, CA, USA
-
Dreger, H., Feldmann, A., Mai, M., Paxson, V. and Sommer, R. (2006) 'Dynamic application-layer protocol analysis for network intrusion detection', Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, USENIX Association, Berkeley, CA, USA, pp.257-272.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 257-272
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
11
-
-
0003415244
-
-
RFC 2616, The Internet Society
-
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P. and Berners-Lee, T. (1999) Hypertext Transfer Protocol-HTTP/1.1, RFC 2616, The Internet Society.
-
(1999)
Hypertext Transfer Protocol-HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
12
-
-
1542350966
-
-
Technical Report CS 20001-0670, Department of Computer Science and Engineering, University of California, San Diego
-
Fisk, M. and Varghese, G. (2001) Fast Content-Based Packet Handling for Intrusion Detection, Technical Report CS 20001-0670, Department of Computer Science and Engineering, University of California, San Diego.
-
(2001)
Fast Content-Based Packet Handling for Intrusion Detection
-
-
Fisk, M.1
Varghese, G.2
-
14
-
-
78650657387
-
-
URL
-
Graham, R. (2002) Evolution of IDS, URL: http://www. robertgraham.com/ slides/0304-evolution-of-ids.ppt
-
(2002)
Evolution of IDS
-
-
Graham, R.1
-
15
-
-
66249097376
-
Research of NIDS in IPV6 based on protocol analysis and pattern matching
-
IEEE Computer Society, Los Alamitos, CA, USA
-
Huang, S., Zhang, H. and Yao, G. (2009) 'Research of NIDS in IPV6 based on protocol analysis and pattern matching', International Workshop on Knowledge Discovery and Data Mining, IEEE Computer Society, Los Alamitos, CA, USA, Vol. 0, pp.542-545.
-
(2009)
International Workshop on Knowledge Discovery and Data Mining
, vol.0
, pp. 542-545
-
-
Huang, S.1
Zhang, H.2
Yao, G.3
-
17
-
-
78650640244
-
-
Internet Systems Consortium, Inc. URL
-
Internet Systems Consortium, Inc. (2004) URL: http://www.isc.org/index. pl?/sw/bind /bind-security.php
-
(2004)
-
-
-
18
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
ACM Press, New York, NY, USA
-
Kruegel, C., Toth, T. and Kirda, E. (2002) 'Service specific anomaly detection for network intrusion detection', SAC '02: Proceedings of the 2002 ACM symposium on Applied computing, ACM Press, New York, NY, USA, pp.201-208.
-
(2002)
SAC '02: Proceedings of the 2002 ACM Symposium on Applied Computing
, pp. 201-208
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
19
-
-
35248819234
-
Using decision trees to improves signature-based intrusion detection
-
Kruegel, C. and Toth, T. (2003) 'Using decision trees to improves signature-based intrusion detection', Proceedings of the 6th International Workshop on the Recent Advances in Intrusion Detection (RAID'2003), LNCS, Vol. 2820, pp.173-191.
-
(2003)
Proceedings of the 6th International Workshop on the Recent Advances in Intrusion Detection (RAID'2003), LNCS
, vol.2820
, pp. 173-191
-
-
Kruegel, C.1
Toth, T.2
-
20
-
-
78650643744
-
-
NFR Security Inc.
-
NFR Security Inc. (2002) NFR, Network Intrusion Detection, v3, URL: http://www.spectrum-systems.com/nfr-nid-datasheet.pdf
-
(2002)
NFR, Network Intrusion Detection, v3
-
-
-
23
-
-
33744584654
-
Induction of decision trees
-
Shavlik, J.W. and Dietterich, T.G. (Eds.)
-
Quinlan, J.R. (1990) 'Induction of decision trees', in Shavlik, J.W. and Dietterich, T.G. (Eds.): Readings in Machine Learning, Morgan Kaufmann, Originally published in Machine Learning, Vol. 1, pp.81-106.
-
(1990)
Readings in Machine Learning, Morgan Kaufmann, Originally Published in Machine Learning
, vol.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
25
-
-
48149088644
-
Implementation of application layer intrusion detection system using protocol analysis
-
Sangeetha, S., Vaidehi, V., Srinivasan, N., Rajkumar, K., Pradeep, S., Ragavan, N., Lokesh, C., Subadeepak, I. and Prashanth, V. (2008) 'Implementation of application layer intrusion detection system using protocol analysis', International Conference on Signal Processing, Communications and Networking 2008. ICSCN '08., pp.279-284.
-
(2008)
International Conference on Signal Processing, Communications and Networking 2008, ICSCN '08
, pp. 279-284
-
-
Sangeetha, S.1
Vaidehi, V.2
Srinivasan, N.3
Rajkumar, K.4
Pradeep, S.5
Ragavan, N.6
Lokesh, C.7
Subadeepak, I.8
Prashanth, V.9
-
26
-
-
14844324904
-
Enhancing byte-level network intrusion detection signatures with context
-
ACM Press, Washington DC, USA
-
Sommer, R. and Paxson, V. (2003) 'Enhancing byte-level network intrusion detection signatures with context', Proceedings of the 10th ACM Conference on Computer and Communication Security, ACM Press, Washington DC, USA, pp.262-271.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 262-271
-
-
Sommer, R.1
Paxson, V.2
-
28
-
-
78650660219
-
RFC 1831: RPC: Remote Procedure Call Protocol Specification Version 2
-
Srinivasan, R. (1995a) RFC 1831: RPC: Remote Procedure Call Protocol Specification Version 2, Status: PROPOSED STANDARD.
-
(1995)
Status: PROPOSED STANDARD
-
-
Srinivasan, R.1
-
29
-
-
78650662907
-
RFC 1832: XDR: External Data Representation Standard
-
Srinivasan, R. (1995b) RFC 1832: XDR: External Data Representation Standard, Status: DRAFT STANDARD.
-
(1995)
Status: DRAFT STANDARD
-
-
Srinivasan, R.1
-
30
-
-
78650643510
-
RFC 1833: Binding Protocols for ONC RPC Version 2
-
Srinivasan, R. (1995c) RFC 1833: Binding Protocols for ONC RPC Version 2, Status: PROPOSED STANDARD.
-
(1995)
Status: PROPOSED STANDARD
-
-
Srinivasan, R.1
-
31
-
-
25144439604
-
-
1st ed. Addison-Wesley, Longman Publishing Co., Inc., Boston, MA, USA
-
Tan, P., Steinbach, M. and Kumar, V. (2005) Introduction to Data Mining, 1st ed., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.
-
(2005)
Introduction to Data Mining
-
-
Tan, P.1
Steinbach, M.2
Kumar, V.3
-
32
-
-
33846283105
-
Verify results of network intrusion alerts using lightweight protocol analysis
-
IEEE Computer Society, Washington DC, USA
-
Zhou, J., Carlson, A.J. and Bishop, M. (2005) 'Verify results of network intrusion alerts using lightweight protocol analysis', ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, IEEE Computer Society, Washington DC, USA, pp.117-126.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 117-126
-
-
Zhou, J.1
Carlson, A.J.2
Bishop, M.3
|