-
1
-
-
84944721192
-
Log correlation for intrusion detection: A proof of concept
-
Las Vegas, NV, USA, December 8-12, IEEE
-
C. Abad, J. Taylor, C. Sengul, W. Yurcik, Y. Zhou, and K. Rowe. Log correlation for intrusion detection: A proof of concept. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), pages 255-264, Las Vegas, NV, USA, December 8-12, 2003. IEEE.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003)
, pp. 255-264
-
-
Abad, C.1
Taylor, J.2
Sengul, C.3
Yurcik, W.4
Zhou, Y.5
Rowe, K.6
-
2
-
-
4444324359
-
An approach to UNIX security logging
-
Arlington, VA, USA, October 5-8
-
S. Axelsson, U. Lindqvist, U. Gustafson, and E. Jonsson. An approach to UNIX security logging. In Proceedings of the 21st National Information Systems Security Conference, pages 62-75, Arlington, VA, USA, October 5-8, 1998.
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 62-75
-
-
Axelsson, S.1
Lindqvist, U.2
Gustafson, U.3
Jonsson, E.4
-
3
-
-
0005540823
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
R. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999.
-
(1999)
Modern Information Retrieval
-
-
Baeza-Yates, R.1
Ribeiro-Neto, B.2
-
4
-
-
0003893616
-
-
Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, USA
-
D. E. Denning and P. G. Neumann. Requirements and model for IDES - A real-time intrusion detection system. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, USA, 1985.
-
(1985)
Requirements and Model for IDES - A Real-time Intrusion Detection System
-
-
Denning, D.E.1
Neumann, P.G.2
-
5
-
-
0038825045
-
Anomaly detection using call stack information
-
Oakland, CA, USA, May 11-14, IEEE
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, pages 62-75, Oakland, CA, USA, May 11-14, 2003. IEEE.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 62-75
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
6
-
-
79851486040
-
-
Visited May 15, 2007
-
S. Fish, G. Keren, Mulix, A. Shalem, and E. Shemer. System call tracker - design, implementation, goals. http://linuxclub.il.eu.org/lectures/44. Visited May 15, 2007.
-
System Call Tracker - Design, Implementation, Goals
-
-
Fish, S.1
Keren, G.2
Shalem, M.A.3
Shemer, E.4
-
7
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA, USA, May 6-8 IEEE
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128, Oakland, CA, USA, May 6-8, 1996. IEEE.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
85084160767
-
On gray-box program tracking for anomaly detection
-
San Diego, CA, USA, August 9-13, USENIX Association
-
D. Gao, M. K. Reiter, and D. X. Song. On gray-box program tracking for anomaly detection. In USENIX Security Symposium, pages 103-118, San Diego, CA, USA, August 9-13, 2004. USENIX Association.
-
(2004)
USENIX Security Symposium
, pp. 103-118
-
-
Gao, D.1
Reiter, M.K.2
Song, D.X.3
-
9
-
-
33745665056
-
Behavioral distance for intrusion detection
-
Seattle, WA, USA, September 7-9, 2005. Springer- Verlag
-
D. Gao, M. K. Reiter, and D. X. Song. Behavioral distance for intrusion detection. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005), pages 63-81, Seattle, WA, USA, September 7-9, 2005. Springer-Verlag.
-
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005)
, pp. 63-81
-
-
Gao, D.1
Reiter, M.K.2
Song, D.X.3
-
10
-
-
0003991982
-
-
O'Reilly, Sebastopol, CA, USA, 2nd edition, April
-
S. Garfinkel and G. Spafford. Practical UNIX and Internet Security. O'Reilly, Sebastopol, CA, USA, 2nd edition, April 1996.
-
(1996)
Practical UNIX and Internet Security
-
-
Garfinkel, S.1
Spafford, G.2
-
11
-
-
85084162795
-
Detecting manipulated remote call streams
-
San Francisco, CA, USA, August 5-9, USENIX Association
-
J. T. Giffin, S. Jha, and B. P. Miller. Detecting manipulated remote call streams. In Proceedings of the 11th USENIX Security Symposium, pages 61-79, San Francisco, CA, USA, August 5-9, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 61-79
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
12
-
-
33846312311
-
Efficient contextsensitive intrusion detection
-
J. T. Giffin, S. Jha, and B. P. Miller. Efficient contextsensitive intrusion detection. In Proceedings of the 11th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 5-6, 2004.
-
Proceedings of the 11th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 5-6, 2004
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
13
-
-
33750298577
-
Automated discovery of mimicry attacks
-
Hamburg, Germany, September 20-22, Springer- Verlag
-
J. T. Giffin, S. Jha, and B. P. Miller. Automated discovery of mimicry attacks. In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), pages 41-60, Hamburg, Germany, September 20-22, 2006. Springer-Verlag.
-
(2006)
Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006)
, pp. 41-60
-
-
Giffin, J.T.1
Jha, S.2
Miller, B.P.3
-
15
-
-
0142157009
-
On the detection of anomalous system call arguments
-
Gjøvik, Norway, October 13-15, 2003. Springer- Verlag
-
C. Kruegel, D. Mutz, F. Valeur, and G. Vigna. On the detection of anomalous system call arguments. In Proceedings of the 2003 European Symposium on Research in Computer Security (ESORICS 2003), pages 326-343, Gjøvik, Norway, October 13-15, 2003. Springer-Verlag.
-
Proceedings of the 2003 European Symposium on Research in Computer Security (ESORICS 2003)
, pp. 326-343
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
16
-
-
85084160262
-
Using text categorization techniques for intrusion detection
-
San Francisco, CA, USA, August 5-9, USENIX Association
-
Y. Liao and V. R. Vemuri. Using text categorization techniques for intrusion detection. In Proceedings of the 11th USENIX Security Symposium, pages 51-59, San Francisco, CA, USA, August 5-9, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 51-59
-
-
Liao, Y.1
Vemuri, V.R.2
-
17
-
-
79851505315
-
-
Visited May 15, 2007
-
Add root user to /etc/passwd. http://www.milw0rm.com/exploits/2803. Visited May 15, 2007.
-
Add Root User to /Etc/passwd
-
-
-
18
-
-
38149083999
-
Exploiting execution context for the detection of anomalous system calls
-
Queensland, Australia, September 5-7 Springer- Verlag
-
D. Mutz, W. Robertson, G. Vigna, and R. Kemmerer. Exploiting execution context for the detection of anomalous system calls. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID 2007), pages 1-20, Queensland, Australia, September 5-7 2007. Springer-Verlag.
-
(2007)
Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID 2007)
, pp. 1-20
-
-
Mutz, D.1
Robertson, W.2
Vigna, G.3
Kemmerer, R.4
-
19
-
-
60749118885
-
A practical mimicry attack against powerful system-call monitors
-
Tokyo, Japan, March 18-20, ACM
-
C. Parampalli, R. Sekar, and R. Johnson. A practical mimicry attack against powerful system-call monitors. In Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 156-167, Tokyo, Japan, March 18-20, 2008. ACM.
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008)
, pp. 156-167
-
-
Parampalli, C.1
Sekar, R.2
Johnson, R.3
-
20
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Oakland, CA, USA, May 14-16, IEEE
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 144-155, Oakland, CA, USA, May 14-16, 2001. IEEE.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
21
-
-
79851483990
-
-
sorbo Visited May 15, 2007
-
sorbo. Linux traceroute exploit code released. http://www.securiteam.com/ exploits/6A00A1F5QM.html. Visited May 15, 2007.
-
Linux Traceroute Exploit Code Released
-
-
-
22
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Zurich, Switzerland, October 16-18, Springer- Verlag
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 54-73, Zurich, Switzerland, October 16-18, 2002. Springer-Verlag.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
23
-
-
33745443149
-
Learning rules from system call arguments and sequences for anomaly detection
-
Melbourne, FL, USA, November 19
-
G. Tandon and P. Chan. Learning rules from system call arguments and sequences for anomaly detection. In ICDM Workshop on Data Mining for Computer Security (DMSEC), pages 20-29, Melbourne, FL, USA, November 19, 2003.
-
(2003)
ICDM Workshop on Data Mining for Computer Security (DMSEC)
, pp. 20-29
-
-
Tandon, G.1
Chan, P.2
-
24
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
Washington D.C., USA, November 18-22, 2002. ACM
-
D. Wagner and P. Soto. Mimicry attacks on host-based intrusion detection systems. In 9th ACM Conference on Computer and Communications Security (CCS 2002), pages 255-264, Washington D.C., USA, November 18-22, 2002. ACM.
-
9th ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
25
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA, USA, May 9-12, IEEE
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 133-145, Oakland, CA, USA, May 9-12, 1999. IEEE.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
26
-
-
79851490034
-
-
Personal communications with
-
Personal communications with Wolfgang John, 2007.
-
(2007)
-
-
John, W.1
|