-
1
-
-
24044465916
-
La detection d'intrusion: Les outils doivent cooperer
-
L. Me, Z. Marrakchi, C. Michel, H. Debar and F. Cuppens, La detection d'intrusion: les outils doivent cooperer, in REE Journal, pp. 50-55, No 5, May, 2001.
-
(2001)
REE Journal
, Issue.5
, pp. 50-55
-
-
Me, L.1
Marrakchi, Z.2
Michel, C.3
Debar, H.4
Cuppens, F.5
-
2
-
-
66249126434
-
Seraphim: An Active Security Architecture for Active Network
-
R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg and S. Yi, Seraphim: An Active Security Architecture for Active Network, in UIUCDCS-R-99-2167, UILU-ENG-99- 1756, Urbana, IL 61801, Nov. 1999.
-
(1999)
UIUCDCS-R-99-2167, UILU-ENG-99- 1756, Urbana, IL
, pp. 61801
-
-
Campbell, R.H.1
Liu, Z.2
Mickunas, M.D.3
Naldurg, P.4
Yi, S.5
-
5
-
-
0010518517
-
Attack Languages
-
USA
-
G. Vigna, S. Eckmann and R. Kemmerer, Attack Languages, in Proceedings of the IEEE Information Survivability Work- shop, USA, pp. 163-166, 2000.
-
(2000)
Proceedings of the IEEE Information Survivability Work- shop
, pp. 163-166
-
-
Vigna, G.1
Eckmann, S.2
Kemmerer, R.3
-
7
-
-
33750702548
-
Experiences Benchmarking Intrusion Detection Systems
-
Dec
-
M. J. Ranum, Experiences Benchmarking Intrusion Detection Systems, in NFR Security, Dec. 2001.
-
(2001)
NFR Security
-
-
Ranum, M.J.1
-
8
-
-
0024984013
-
A Network Security Monitor
-
T. L. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood and D. Wolber, A Network Security Monitor, in Proceedings of the Symposium on Research in Securirt and Privacy, May 1990.
-
(1990)
Proceedings of the Symposium on Research in Securirt and Privacy
-
-
Heberlein, T.L.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
11
-
-
78651588897
-
-
[Online]. Available: http
-
(2008, Mar.) CISCO. [Online]. Available: http: http://www.cisco.com.
-
(2008)
CISCO
-
-
-
12
-
-
84868051596
-
-
[Online]. Available: http
-
(2008, Mar.) RealSecure. [Online]. Available: http: http://www.iss.net.
-
(2008)
RealSecure
-
-
-
13
-
-
0141590483
-
Applying mobile agents to intrusion detection and response
-
W. Jansen, P. Mell, T. Karygiannis and D. Marks, Applying mobile agents to intrusion detection and response, NIST Interim Report - 6416, Oct. 1999.
-
(1999)
NIST Interim Report -
, pp. 6416
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
14
-
-
84955580290
-
An Architecture for Intrusion Detection using Autonomous Agents
-
J. S. Balasubramaniyam, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford and D. Zamboni, An Architecture for Intrusion Detection using Autonomous Agents, in Proceedings of the 14th Annual Computer Security Applications Conference, Dec. 1998.
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
-
-
Balasubramaniyam, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
15
-
-
37249008138
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
T. H. Ptacek and T. N. Newsham, Insertion, evasion, and denial of service: Eluding network intrusion detection, Secure Network Inc., Jan. 1998.
-
(1998)
Secure Network Inc.
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
16
-
-
78651529319
-
-
[Online]. Available: http
-
(2007, Oct.) SNORT. [Online]. Available: http: http://www.snort.org/.
-
(2007)
SNORT
-
-
-
17
-
-
33645402669
-
-
Publishing as Prentice Hall PTR Upper Saddle River, New Jersey 07458, ISBN 0-13-140733-3
-
R. U. Rehman, Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID, Publishing as Prentice Hall PTR Upper Saddle River, New Jersey 07458, ISBN 0-13-140733-3, 2003.
-
(2003)
Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID
-
-
Rehman, R.U.1
-
18
-
-
78651561642
-
-
[Online]. Available: http
-
(2007, Nov.) NMAP. [Online]. Available: http: http://www.insecure.org/nmap.
-
(2007)
NMAP
-
-
-
19
-
-
78651576129
-
-
[Online]. Available: http
-
(2007, Oct.) Prelude-IDS. [Online]. Available: http: http://www.prelude-ids.org.
-
(2007)
Prelude-IDS
-
-
-
20
-
-
78651527161
-
-
[Online]. Available: http
-
(2007, Oct.) Tamandua. [Online]. Available: http: http://tamandua.axur.org.
-
(2007)
Tamandua
-
-
-
21
-
-
34248401104
-
Application Layer Intrusion Detection for SQL Injection
-
Melbourne, Florida, USA, Mar
-
F. S. Rietta, Application Layer Intrusion Detection for SQL Injection, in ACM SE06 1012, Melbourne, Florida, USA, Mar. 2006.
-
ACM SE06
, pp. 1012
-
-
Rietta, F.S.1
-
22
-
-
66249108400
-
Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition
-
D. Curry and H. Debar, Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition, Intrusion Detection Working Group, 116 pages, Jan. 2003.
-
(2003)
Intrusion Detection Working Group
, pp. 116
-
-
Curry, D.1
Debar, H.2
-
23
-
-
66249093630
-
Attack Detection using Cooperating Autonomous Detection Systems (CATS)
-
University of Tbingen
-
F. Dressler, G. Mnz and G. Carle, Attack Detection using Cooperating Autonomous Detection Systems (CATS), Wilhelm-Schickard-Institute of Computer Science, Computer Networks and Internet, University of Tbingen, 2004.
-
(2004)
Wilhelm-Schickard-Institute of Computer Science, Computer Networks and Internet
-
-
Dressler, F.1
Mnz, G.2
Carle, G.3
-
25
-
-
85132972574
-
Distributed Denial of Service: Taxonomies of Attacks
-
S. Specht and R. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures, in Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, pp. 543-550, Sep. 2004.
-
(2004)
Tools, and Countermeasures, in Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems
, pp. 543-550
-
-
Specht, S.1
Lee, R.2
-
26
-
-
0038729639
-
-
G. Hulmer, J. S. K. Wong, V. Honavar, L. Miller and Y. Wang, Lightweight Agents for Intrusion Detection, in Journal of Systems and Software 67 (03), pp. 109-122, 2003.
-
(2003)
Lightweight Agents for Intrusion Detection, in Journal of Systems and Software
, vol.67
, Issue.3
, pp. 109-122
-
-
Hulmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
Wang, Y.5
-
28
-
-
78651557272
-
-
Palmquis, Intelligent Agents in Computer and Network Management, (course paper)
-
Palmquis, Intelligent Agents in Computer and Network Management, 1998, (course paper). http://www.gslis.utexas.edu/palmquis/courses.
-
(1998)
-
-
-
29
-
-
27744544969
-
A Method of Tracing Intruders by Use of Mobile Agents
-
San Jose, California
-
M. Asaka, S. Okasawa, A. Taguchi and S. Goto, A Method of Tracing Intruders by Use of Mobile Agents, in Proceedings of the 9th Annual Internetworking Conference (INET'99), San Jose, California, June 1999.
-
(1999)
In Proceedings of the 9th Annual Internetworking Conference (INET'99)
-
-
Asaka, M.1
Okasawa, S.2
Taguchi, A.3
Goto, S.4
-
32
-
-
0034300682
-
Intrusion Detection Using Autonomous Agents, in
-
E. H. Spafford and D. Zamboni, Intrusion Detection Using Autonomous Agents, in Computer Networks: The Int. Journal of Computer and Telecommunications Networking 34(4), pp. 547-570, 2000.
-
(2000)
Computer Networks: The Int. Journal of Computer and Telecommunications Networking
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
33
-
-
33745590283
-
A Multi-agent Based System for Intrusion Detection
-
I. M. Hegazy, T. Al-Arif, Z. T. Fayed and H. M. Faheem, A Multi-agent Based System for Intrusion Detection, in IEEE Potentials 22(4), pp. 28-31, 2003.
-
(2003)
IEEE Potentials
, vol.22
, Issue.4
, pp. 28-31
-
-
Hegazy, I.M.1
Al-Arif, T.2
Fayed, Z.T.3
Faheem, H.M.4
-
34
-
-
24344493979
-
CIDS: An agentbased intrusion detection system
-
D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez and R. Yarramsettii, CIDS: An agentbased intrusion detection system, in Computers & Security 24(5), pp. 387-398, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.5
, pp. 387-398
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Gomez, J.4
Yarramsettii, R.5
-
35
-
-
33745660126
-
Mobile Agents for Network Intrusion Resistance
-
Springer, Heidelberg
-
H. Q. Wang, Z. Q. Wang, Q. Zhao, G. F. Wang, R. J. Zheng D. X. Liu, Mobile Agents for Network Intrusion Resistance, in APWeb 2006. LNCS, vol. 3842, Springer, Heidelberg, pp. 965-970, 2006.
-
(2006)
APWeb 2006. LNCS
, vol.3842
, pp. 965-970
-
-
Wang, H.Q.1
Wang, Z.Q.2
Zhao, Q.3
Wang, G.F.4
Zheng, R.J.5
Liu, D.X.6
-
36
-
-
35048820538
-
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
-
Springer, Heidelberg
-
K. Deeter, K. Singh, S. Wilson, L. Filipozzi and S. Vuong, APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System, in Mobility Aware Technologies and Applications. LNCS, vol. 3284, Springer, Heidelberg, pp. 244-253, 2004.
-
(2004)
Mobility Aware Technologies and Applications. LNCS
, vol.3284
, pp. 244-253
-
-
Deeter, K.1
Singh, K.2
Wilson, S.3
Filipozzi, L.4
Vuong, S.5
-
38
-
-
66249091747
-
-
University of Minnesota, May
-
A. Trapathi, T. Ahmed, S. Pathak, A. Pathak, M. Carney, M. Koka and P. Dokas, Active Monotoring of Network System using Mobile Agents, University of Minnesota, May 2002.
-
(2002)
Active Monotoring of Network System using Mobile Agents
-
-
Trapathi, A.1
Ahmed, T.2
Pathak, S.3
Pathak, A.4
Carney, M.5
Koka, M.6
Dokas, P.7
-
39
-
-
84868958875
-
-
N. Daira, [Online]. Available: http:
-
(2007, Aug.) N. Daira, Strorshield presentation. [Online]. Available: http: http://www.skyrecon.com/, 2004.
-
(2007)
Strorshield presentation
-
-
-
43
-
-
0003640863
-
-
Seconde Edition, ISBN 0- 201-32582-9, Massachusetts, Addison Wesley
-
D. B. Lange and M. Oshima, Programming and Deploying Java Mobile Agents with Aglets, Seconde Edition, ISBN 0- 201-32582-9, Massachusetts, Addison Wesley, 1998, 225 p.
-
(1998)
Programming and Deploying Java Mobile Agents with Aglets
, pp. 225
-
-
Lange, D.B.1
Oshima, M.2
-
44
-
-
78651528116
-
Toward Agent IDS: Agents Platforms Security Features Study
-
Computer security Congress, Mexique
-
N. EL Kadhi, F. A. Barika, E. Burstein and K. Ghedira, Toward Agent IDS: Agents Platforms Security Features Study, in Proceedings of CSC 2003, Computer security Congress, Mexique, Mar. 2003.
-
(2003)
Proceedings of CSC 2003
-
-
El Kadhi, N.1
Barika, F.A.2
Burstein, E.3
Ghedira, K.4
-
47
-
-
33751098470
-
-
[Online]. Available: http
-
The Aglets Software Development Kit. [Online]. Available: http: http://sourceforge.net/projects/aglets/, June 2002.
-
(2002)
The Aglets Software Development Kit
-
-
-
49
-
-
66249129175
-
Hardening the TCP/IP stack to SYN attacks
-
M. Burdach, Hardening the TCP/IP stack to SYN attacks, in SecurityFocus, Sep. 2003.
-
SecurityFocus
, pp. 2003
-
-
Burdach, M.1
-
50
-
-
78651528511
-
-
[Online]. Available: http
-
(2007, Nov.) HPING. [Online]. Available: http: http://www.hping.org.
-
(2007)
HPING
-
-
-
51
-
-
78651521629
-
-
[Online]. Available: http
-
(2007, Oct.) Firestorm. [Online]. Available: http: http://www.scaramanga.co.uk/firestorm/.
-
(2007)
Firestorm
-
-
-
52
-
-
66249148816
-
CAMNEP: Agent-based network intrusion detection system
-
M. Rehk, M. Pechoucek, P. Celeda, J. Novotn, P. Minark, CAMNEP: agent-based network intrusion detection system. Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems, pp. 133-136, 2008.
-
(2008)
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems
, pp. 133-136
-
-
Rehk, M.1
Pechoucek, M.2
Celeda, P.3
Novotn, J.4
Minark, P.5
-
54
-
-
0004137004
-
-
ISBN 0-521-58519-8, Cambridge University Press
-
D. Gusfield, Algorithms on Strings, Trees, and Sequences, ISBN 0-521-58519-8, Cambridge University Press, 1997, 554 p.
-
(1997)
Algorithms on Strings, Trees, and Sequences
, pp. 554
-
-
Gusfield, D.1
-
56
-
-
78651557271
-
-
KDD Cup 1999
-
Ben Amor, N., Benferhat, S., Elouedi Z., Rseaux baysiens nafs et arbres de dcision dans les systmes de detection dintrusions, RSTI, VOL 25/2, pp.167-196, (2006) KDD Cup 1999:
-
(2006)
Rseaux baysiens nafs et arbres de dcision dans les systmes de detection dintrusions, RSTI
, vol.25
, pp. 167-196
-
-
Ben Amor, N.1
Benferhat, S.2
Elouedi, Z.3
-
57
-
-
78651592432
-
-
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
-
-
|