-
1
-
-
33751039507
-
Dataflow anomaly detection
-
IEEE Computer Society, Washington DC, USA
-
Bhatkar, S., Chaturvedi, A. and Sekar, R. (2006) 'Dataflow anomaly detection', SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington DC, USA, pp.48-62.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 48-62
-
-
Bhatkar, S.1
Chaturvedi, A.2
Sekar, R.3
-
2
-
-
78650633478
-
Towards software-based signature detection for intrusion prevention on the network card
-
ACM, Seattle, WA, USA
-
Bos, H. and Huang, K. (2005) 'Towards software-based signature detection for intrusion prevention on the network card', Proceedings of RAID, ACM, Seattle, WA, USA.
-
(2005)
Proceedings of RAID
-
-
Bos, H.1
Huang, K.2
-
3
-
-
18744372151
-
Misuse detection for information retrieval systems
-
New Orleans, LA, USA
-
Cathey, R., Ma, L., Goharian, N. and Grossman, D. (2003) 'Misuse detection for information retrieval systems', CIKM '03: Proceedings of the Twelfth International Conference on Information and Knowledge Management, New Orleans, LA, USA, pp.183-190.
-
(2003)
CIKM '03: Proceedings of the Twelfth International Conference on Information and Knowledge Management
, pp. 183-190
-
-
Cathey, R.1
Ma, L.2
Goharian, N.3
Grossman, D.4
-
4
-
-
34548324846
-
Measuring network-aware worm spreading ability
-
Anchorage, AK, USA
-
Chen, Z. and Ji, C. (2007) 'Measuring network-aware worm spreading ability', Proceedings of IEEE INFOCOM, Anchorage, AK, USA, pp.116-124.
-
(2007)
Proceedings of IEEE INFOCOM
, pp. 116-124
-
-
Chen, Z.1
Ji, C.2
-
5
-
-
51349126234
-
Spatial-temporal characteristics of internet malicious sources
-
Phoenix, AZ, USA
-
Chen, Z., Ji, C. and Paul, B. (2008) 'Spatial-temporal characteristics of internet malicious sources', Proceedings of IEEE INFOCOM (Mini-Conference), Phoenix, AZ, USA.
-
(2008)
Proceedings of IEEE INFOCOM (Mini-Conference)
-
-
Chen, Z.1
Ji, C.2
Paul, B.3
-
6
-
-
1642409662
-
Demids: A misuse detection system for database systems
-
Kluwer Academic Publishers, Amsterdam, The Netherlands
-
Chung, C.Y., Gertz, M. and Levitt, K. (1999) 'Demids: a misuse detection system for database systems', Proceedings of the Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, Kluwer Academic Publishers, Amsterdam, The Netherlands, pp.159-178.
-
(1999)
Proceedings of the Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems
, pp. 159-178
-
-
Chung, C.Y.1
Gertz, M.2
Levitt, K.3
-
7
-
-
38149011298
-
Swaddler: An approach for the anomaly-based detection of state violations in web applications
-
5-7 September, Queensland, Australia
-
Cova, M., Balzarotti, D., Felmetsger, V. and Vigna, G. (2007) 'Swaddler: an approach for the anomaly-based detection of state violations in web applications', Proceedings of RAID, 5-7 September, Queensland, Australia, pp.63-86.
-
(2007)
Proceedings of RAID
, pp. 63-86
-
-
Cova, M.1
Balzarotti, D.2
Felmetsger, V.3
Vigna, G.4
-
8
-
-
23944487084
-
-
Technical report, IBM Research, October
-
Debar, H., Dacier, M. and Wespi, A. (1999) A Revised Taxonomy for Intrusion Detection Systems, Technical report, IBM Research, October.
-
(1999)
A Revised Taxonomy for Intrusion Detection Systems
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
9
-
-
0023294428
-
An intrusion-detection model'
-
Denning, D.E. (1987) 'An intrusion-detection model', IEEE Trans. Softw. Eng., Vol. 13, No. 2, pp.222-232.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
10
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
USENIX Association, Berkeley, CA, USA
-
Dreger, H., Feldmann, A., Mai, M., Paxson, V. and Sommer, R. (2006) 'Dynamic application-layer protocol analysis for network intrusion detection', Proceeding of USENIX-SS'06, USENIX Association, Berkeley, CA, USA.
-
(2006)
Proceeding of USENIX-SS'06
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
11
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
ACM, New York, NY, USA
-
Fogla, P. and Lee, W. (2006) 'Evading network anomaly detection systems: formal reasoning and practical techniques', CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, pp.59-68.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 59-68
-
-
Fogla, P.1
Lee, W.2
-
12
-
-
33745644031
-
Environment-sensitive intrusion detection
-
Giffin, J.T., Dagon, D., Jha, S., Lee, W. and Miller, B.P. (2005) 'Environment-sensitive intrusion detection', Proceedings of RAID, pp.185-206.
-
(2005)
Proceedings of RAID
, pp. 185-206
-
-
Giffin, J.T.1
Dagon, D.2
Jha, S.3
Lee, W.4
Miller, B.P.5
-
13
-
-
33750309124
-
Enhancing network intrusion detection with integrated sampling and filtering
-
González, J.M. and Paxson, V. (2006) 'Enhancing network intrusion detection with integrated sampling and filtering', Proceedings of RAID, pp.272-289.
-
(2006)
Proceedings of RAID
, pp. 272-289
-
-
González, J.M.1
Paxson, V.2
-
14
-
-
27544463920
-
Efficient intrusion detection using automaton inlining
-
Washington DC, USA
-
Gopalakrishna, R., Spafford, E.H. and Vitek, J. (2005) 'Efficient intrusion detection using automaton inlining', SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington DC, USA, pp.18-31.
-
(2005)
SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 18-31
-
-
Gopalakrishna, R.1
Spafford, E.H.2
Vitek, J.3
-
15
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
IEEE Computer Society, Washington DC, USA
-
Gosh, A.K., Wanken, J. and Charron, F. (1998) 'Detecting anomalous and unknown intrusions against programs', ACSAC '98: Proceedings of the 14th Annual Computer Security Applications Conference, IEEE Computer Society, Washington DC, USA, p.259.
-
(1998)
ACSAC '98: Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 259
-
-
Gosh, A.K.1
Wanken, J.2
Charron, F.3
-
16
-
-
35248819234
-
Using decision trees to improve signature-based intrusion detection
-
Krügel, C. and Toth, T. (2003) 'Using decision trees to improve signature-based intrusion detection', Proceedings of RAID, pp.173-191.
-
(2003)
Proceedings of RAID
, pp. 173-191
-
-
Krügel, C.1
Toth, T.2
-
17
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection'
-
Lane, T. and Brodley, C.E. (1999) 'Temporal sequence learning and data reduction for anomaly detection', ACM Trans. Inf. Syst. Secur., Vol. 2, No. 3, pp.295-331.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
18
-
-
0032630098
-
Detecting computer and network misuse through the production-based expert system toolset (p-BEST)
-
Lindqvist, U. and Porras, P.A. (1999) 'Detecting computer and network misuse through the production-based expert system toolset (p-BEST)', IEEE Symposium on Security and Privacy, pp.146-161.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
19
-
-
33745653877
-
Interactive visualization for network and port scan detection
-
Muelder, C., Ma, K-L. and Bartoletti, T. (2005) 'Interactive visualization for network and port scan detection', Proceedings of RAID, pp.265-283.
-
(2005)
Proceedings of RAID
, pp. 265-283
-
-
Muelder, C.1
Ma, K.-L.2
Bartoletti, T.3
-
20
-
-
38149083999
-
Exploiting execution context for the detection of anomalous system calls
-
Mutz, D., Robertson, W.K., Vigna, G. and Kemmerer, R.A. (2007) 'Exploiting execution context for the detection of anomalous system calls', Proceedings of RAID, pp.1-20.
-
(2007)
Proceedings of RAID
, pp. 1-20
-
-
Mutz, D.1
Robertson, W.K.2
Vigna, G.3
Kemmerer, R.A.4
-
21
-
-
0034782006
-
An investigation of geographic mapping techniques for internet hosts
-
DOI 10.1145/964723.383073
-
Padmanabhan, V.N. and Subramanian, L. (2001) 'An investigation of geographic mapping techniques for internet hosts', SIGCOMM '01, ACM, New York, NY, USA, pp.173-185. (Pubitemid 32981963)
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 173-185
-
-
Padmanabhan, V.N.1
Subramanian, L.2
-
22
-
-
38149093160
-
Emulation-based detection of non-self-contained polymorphic shellcode
-
Springer
-
Polychronakis, M., Anagnostakis, K.G. and Markatos, E.P. (2007) 'Emulation-based detection of non-self-contained polymorphic shellcode', Proceedings of RAID, Springer, Vol. 4637, pp.87-106.
-
(2007)
Proceedings of RAID
, vol.4637
, pp. 87-106
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
23
-
-
31844452004
-
On the effectiveness of distributed worm monitoring
-
USENIX Association, Baltimore, MD, USA
-
Rajab, M.A., Monrose, F. and Terzis, A. (2005) 'On the effectiveness of distributed worm monitoring', SSYM'05: Proceedings of the 14th Conference on USENIX Security Symposium, USENIX Association, Baltimore, MD, USA, pp.15-15.
-
(2005)
SSYM'05: Proceedings of the 14th Conference on USENIX Security Symposium
, pp. 15-15
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
-
24
-
-
27544472436
-
Language-based generation and evaluation of nids signatures
-
IEEE Computer Society, Washington DC, USA
-
Rubin, S., Jha, S. and Miller, B.P. (2005) 'Language-based generation and evaluation of nids signatures', SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington DC, USA, pp.3-17.
-
(2005)
SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Rubin, S.1
Jha, S.2
Miller, B.P.3
-
25
-
-
38149092413
-
Understanding precision in host based intrusion detection
-
Sharif, M.I., Singh, K., Giffin, J.T. and Lee, W. (2007) 'Understanding precision in host based intrusion detection', Proceedings of RAID, pp.21-41.
-
(2007)
Proceedings of RAID
, pp. 21-41
-
-
Sharif, M.I.1
Singh, K.2
Giffin, J.T.3
Lee, W.4
-
26
-
-
33750337672
-
Wind: Workload-aware intrusion detection
-
Sinha, S., Jahanian, F. and Patel, J.M. (2006) 'Wind: workload-aware intrusion detection', Proceedings of RAID, pp.290-310.
-
(2006)
Proceedings of RAID
, pp. 290-310
-
-
Sinha, S.1
Jahanian, F.2
Patel, J.M.3
-
27
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
USENIX Association, Berkeley, CA, USA
-
Soule, A., Salamatian, K. and Taft, N. (2005) 'Combining filtering and statistical methods for anomaly detection', IMC'05: Proceedings of the Internet Measurement Conference 2005 on Internet Measurement Conference, USENIX Association, Berkeley, CA, USA, pp.31-31.
-
(2005)
IMC'05: Proceedings of the Internet Measurement Conference 2005 on Internet Measurement Conference
, pp. 31-31
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
28
-
-
14944380936
-
The top speed of flash worms
-
ACM, New York, NY, USA
-
Staniford, S., Moore, D., Paxson, V. and Weaver, N. (2004) 'The top speed of flash worms', WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode, ACM, New York, NY, USA, pp.33-42.
-
(2004)
WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
29
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, USA
-
Staniford, S., Paxson, V. and Weaver, N. (2002) 'How to own the internet in your spare time', Proceedings of the 11th USENIX Security, San Francisco, CA, USA.
-
(2002)
Proceedings of the 11th USENIX Security
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
30
-
-
33750597720
-
Improving host-based ids with argument abstraction to prevent mimicry attacks
-
Sufatrio and Yap, R.H.C. (2005) 'Improving host-based ids with argument abstraction to prevent mimicry attacks', Proceedings of RAID, pp.146-164.
-
(2005)
Proceedings of RAID
, pp. 146-164
-
-
Sufatrio1
Yap, R.H.C.2
-
31
-
-
38149024764
-
The nids cluster: Scalable, stateful network intrusion detection on commodity hardware
-
Vallentin, M., Sommer, R., Lee, J., Leres, C., Paxson, V. and Tierney, B. (2007) 'The nids cluster: Scalable, stateful network intrusion detection on commodity hardware', Proceedings of RAID, pp.107-126.
-
(2007)
Proceedings of RAID
, pp. 107-126
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxson, V.5
Tierney, B.6
-
32
-
-
56549099368
-
Gnort: High performance network intrusion detection using graphics processors)
-
Lippmann, R., Kirda, E. and Trachtenberg, A. (Eds.) Springer, Cambridge, MA, USA
-
Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P. and Ioannidis, S. (2008) 'Gnort: high performance network intrusion detection using graphics processors)', in Lippmann, R., Kirda, E. and Trachtenberg, A. (Eds.): Proceedings of RAID, Volume 5230 of Lecture Notes in Computer Science, Springer, Cambridge, MA, USA, pp.116-134.
-
(2008)
Proceedings of RAID Volume 5230 of Lecture Notes in Computer Science
, pp. 116-134
-
-
Vasiliadis, G.1
Antonatos, S.2
Polychronakis, M.3
Markatos, E.P.4
Ioannidis, S.5
-
33
-
-
33745641552
-
Anomalous payload-based worm detection and signature generation
-
Wang, K., Cretu, G.F. and Stolfo, S.J. (2005) 'Anomalous payload-based worm detection and signature generation', Proceedings of RAID, Seattle, Washington, USA, pp.227-246.
-
(2005)
Proceedings of RAID, Seattle, Washington, USA
, pp. 227-246
-
-
Wang, K.1
Cretu, G.F.2
Stolfo, S.J.3
-
34
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
Hamburg, Germany
-
Wang, K., Parekh, J.J. and Stolfo, S.J. (2006) 'Anagram: a content anomaly detector resistant to mimicry attack', Proceedings of RAID, Hamburg, Germany, pp.226-248.
-
(2006)
Proceedings of RAID
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
-
35
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
Zou, C.C., Towsley, D. and Gong, W. (2006) 'On the performance of internet worm scanning strategies', Perform. Eval., Vol. 63, No. 7, pp.700-723.
-
(2006)
Perform. Eval.
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
36
-
-
84946740842
-
-
Hostip, IP Address lookup, http://www.hostip.info/dl/ index.html
-
IP Address Lookup
-
-
-
37
-
-
78650655031
-
-
IP2Location, Geolocation IP address to Country City Region
-
IP2Location, Geolocation IP address to Country City Region
-
-
-
-
38
-
-
78650671654
-
-
Latitude Longitude
-
Latitude Longitude, http://www.ip2location.com/
-
-
-
-
39
-
-
84949506498
-
-
Libpcap, The Libpcap Project, http://sourceforge.net/projects/ libpcap/
-
The Libpcap Project
-
-
|