-
3
-
-
34548192255
-
-
CERT Coordination Center, Available by anonymous ftp from ftp.cert.org October
-
CERT Coordination Center, Syslog vulnerability-A workaround for sendmail. Available by anonymous ftp from ftp.cert.org (October 1995).
-
(1995)
Syslog Vulnerability-A Workaround for Sendmail
-
-
-
4
-
-
0342867253
-
Computer intrusion detection: A comparative survey
-
Technical Report 95-07, University of Wollongong, NSW 2522, Australia May
-
Mansour Esmaili, Rei Safavi-Naini and Josef Pieprzyk, Computer intrusion detection: A comparative survey, Technical Report 95-07, Center for Computer Security Research, University of Wollongong, NSW 2522, Australia (May 1995).
-
(1995)
Center for Computer Security Research
-
-
Esmaili, M.1
R. Safavi-Naini2
Pieprzyk, J.3
-
5
-
-
0343302301
-
-
Available from May
-
Dan Farmer, Cops overview, Available from http://www.trouble.org/cops/ overview.html (May 1993).
-
(1993)
Cops Overview
-
-
Farmer, D.1
-
7
-
-
0013193905
-
The cops security checker system
-
Anaheim, CA, June
-
Daniel Farmer and Eugene Spaffors, The cops security checker system, Proc. Summer USENIX Conference (Anaheim, CA, June 1990) 165-170.
-
(1990)
Proc. Summer USENIX Conference
, pp. 165-170
-
-
Farmer, D.1
Spaffors, E.2
-
9
-
-
0003200953
-
Artificial intelligence and intrusion detection: Current and future directions
-
Baltimore, MD, October
-
Jeremy Frank, Artificial intelligence and intrusion detection: Current and future directions, Proc. 17th National Computer Security Conference (Baltimore, MD, October 1994).
-
(1994)
Proc 17th National Computer Security Conference
-
-
Frank, J.1
-
11
-
-
83455245675
-
-
Haystack Labs Inc.Available from the company's website at
-
Haystack Labs, Inc. Sytalker, Available from the company's website at http://www.haystak.com/stalk.html (1997).
-
(1997)
Sytalker
-
-
-
12
-
-
0024984013
-
A network security monitor
-
1990 IEEE Comput Soc Symp Res Secur Privacy
-
L.Todd Heberlein, Gihan V.Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood and David Wolber, A network security monitor, Proc. Symposium on Research in Security and Privacy, Oakland CA, May 1990, 296-304, (IEEE Computer Society Press, Los Alamitos, CA). (Pubitemid 20739296)
-
(1990)
Proceedings of the Symposium on Security and Privacy
, pp. 296-304
-
-
Heberlein L.Todd1
Dias Gihan, V.2
Levitt Karl, N.3
Mukherjee Biswanath4
Wood Jeff5
Wolber David Davis6
-
13
-
-
83455203030
-
-
Internet Security Systems Inc
-
Internet Security Systems, Inc. RealSecure, Internet http://www.iss.net/ prod/rsds.html (1997).
-
(1997)
Real Secure Internet
-
-
-
14
-
-
0003690982
-
-
Technical Report A007/A008/A009/A011/A012/A014, SRI International, 333 Ravenswood Avenue, Menlo Park, CA 94025 (March
-
R. Jagannathan, Teresa Lunt, Debra Anderson, Chris Dodd, Fred Gilham, Caveh Jalali, Hal Javitz, Peter Neumann, Ann Tamaru and Alfonso Valdes, System design document: Nextgeneration intrusion detection expert system (NIDES), Technical Report A007/A008/A009/A011/A012/A014, SRI International, 333 Ravenswood Avenue, Menlo Park, CA 94025 (March 1993).
-
(1993)
System Design Document: Nextgeneration Intrusion Detection Expert System (NIDES)
-
-
Jagannathan, R.1
Lunt, T.2
Anderson, D.3
Dodd, C.4
Gilham, F.5
Jalali, C.6
Javitz, H.7
Neumann, P.8
Tamaru, A.9
Valdes, A.10
-
16
-
-
0742265703
-
Next generation intrusion detection expert system (NIDES) 1. Statistical algorithms rationale
-
Technical Report A016 Rationales, SRI International, 333 Ravenwood Aveneue, Menlo Park, CA (March
-
Harold S.Javitz, Alfonso Valdez, Teresa F. Lunt, Ann Tamaru, Marby Tyson and John Lowrance, Next generation intrusion detection expert system (NIDES). 1. Statistical algorithms rationale. 2. Rationale for proposed resolver, Technical Report A016 Rationales, SRI International, 333 Ravenwood Aveneue, Menlo Park, CA (March 1993).
-
(1993)
Rationale for Proposed Resolver
-
-
Javitz, H.S.1
Valdez, A.2
Lunt, T.F.3
Tamaru, A.4
Tyson, M.5
Lowrance, J.6
-
17
-
-
0003541908
-
-
Technical Report CDRL A005, MCNC Information Technologies Division, Research Triangle Park, N.C.127709 April
-
Y. Franck Jou, Fengmin Gong, Chandru Sargor, Shyhtsun Felix Wu and W. Rance Cleaveland, Architecture design of a scalable intrusion detection system for the emerging network infrastructure, Technical Report CDRL A005, MCNC Information Technologies Division, Research Triangle Park, N.C.27709 (April 1997).
-
(1997)
Architecture Design of a Scalable Intrusion Detection System for the Emerging Network Infrastructure
-
-
Jou, Y.F.1
Gong, F.2
Sargor, C.3
Wu, S.F.4
Cleaveland, W.R.5
-
18
-
-
84988573115
-
The design and implementation of tripwire: A file system integrity checker
-
Jacques Stern, ed.,ACM Press, COAST, Purdue, November
-
Gene H. Kim and Eugene H. Spafford, The design and implementation of tripwire: A file system integrity checker, in: Jacques Stern, ed., 2nd ACM Conference on Computer and Communications Security (ACM Press, COAST, Purdue, November 1994) 18-29.
-
(1994)
2nd ACM Conference on Computer and Communications Security
, pp. 18-29
-
-
Kim, G.H.1
Spafford, E.H.2
-
20
-
-
0003111439
-
Automated audit trial analysis and intrusion detection: A survey
-
Baltimore, MD, October
-
Teresa F. Lunt, Automated audit trial analysis and intrusion detection: A survey, Proc. 11th National Computer Security Conference (Baltimore, MD, October 1988).
-
(1988)
Proc. 11th National Computer Security Conference
-
-
Lunt, T.F.1
-
21
-
-
0027609384
-
A survey of intrusion detection techniques
-
June
-
Teresa F. Lunt, A survey of intrusion detection techniques, Computers & Security, 12(4) (June 1993) 405-418.
-
(1993)
Computers & Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
22
-
-
33646029915
-
Is your computer being misued? A survey of current intrusion detection system technology
-
Tuscon, AZ, December
-
Noelle McAuliffe, Dawn Wolcott, Lorrayne Schafer, Nancy Kelem, Brian Hubbard and Theresa Haley, Is your computer being misued? A survey of current intrusion detection system technology, Proc. 6th Annual Computer Security Applications Conference (Tuscon, AZ, December 1990) 260-72.
-
(1990)
Proc. 6th Annual Computer Security Applications Conference
, pp. 260-72
-
-
N. McAuliffe1
Wolcott, D.2
Schafer, L.3
Kelem, N.4
Hubbard, B.5
Haley, T.6
-
23
-
-
0343302296
-
-
Network Associates Inc. Available from the company's website at
-
Network Associates Inc., Cybercop scanner, Available from the company's website at http://www.nai.com/products/security/ballista/default.asp (1998).
-
(1998)
Cybercop Scanner
-
-
-
24
-
-
83455203029
-
-
Network Associates Inc. Available from the company's website at
-
Network Associates Inc., Cybercop server, Available from the company's website at http://www.nai.com/products/secueity/cybercopsvr/index.asp (1998).
-
(1998)
Cybercop Server
-
-
-
26
-
-
85094814712
-
The tamu security package: An ongoing response to internet intruders in an academic environment
-
Santa Clara, CA, October
-
David R. Safford, Douglas Lee Schales and David K. Hess, The tamu security package: An ongoing response to internet intruders in an academic environment, Proc. 4th USENIX Security Symposium (Santa Clara, CA, October 1993) 91-118.
-
(1993)
Proc. 4th USENIX Security Symposium
, pp. 91-118
-
-
Safford, D.R.1
Schales, D.L.2
Hess, D.K.3
-
27
-
-
83455178582
-
-
Secure Networks Inc. Available from the company's website at
-
Secure Networks, Inc. Ballista security auditing system, Available from the company's website at http://www/securenetworks.com/ballista/ballista.html (1997).
-
(1997)
Ballista Security Auditing System
-
-
-
29
-
-
0002473030
-
DIDS (distributed intrusion detection system)-motivation, architecture and an early prototype
-
Washington, DC, October
-
Steven R.Snapp, James Brentano, Gihan V.Dias, Terrance L. Goan, L. Todd Heberlein, Che lin Ho, Karl N. Levitt, Biswanath Mukherjee, Stepehen E. Smaha, Tim Grance, Daniel M. Teal and Doug Mansur, DIDS (distributed intrusion detection system)-motivation, architecture and an early prototype, Proc. 14th National Computer Security Conference (Washington, DC, October 1991) 167-176.
-
(1991)
Proc. 14th National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
Goan, T.L.4
Heberlein, L.T.5
Ho, C.6
Levitt, K.N.7
Mukherjee, B.8
Smaha, S.E.9
Grance, T.10
Teal, D.M.11
Mansur, D.12
-
30
-
-
0343737828
-
SECURENET: A network-oriented intelligent intrusion prevention and detection system
-
Paul Spirakis, Sokratis Katsikas, Dimitris Gritzalis, Francois Allegre, John Darzentas, Claude Gigante, Dimitris Karagiannis, P. Kess, heiki Putkonen and Thomas Spyrou, SECURENET: A network-oriented intelligent intrusion prevention and detection system, Network Security Journal 1(1) (1994).
-
(1994)
Network Security Journal
, vol.1
, pp. 1
-
-
Spirakis, P.1
Katsikas, S.2
Gritzalis, D.3
Allegre, F.4
Darzentas, J.5
Gigante, C.6
Karagiannis, D.7
Kess, P.8
Putkonen, H.9
Spyrou, T.10
-
31
-
-
84857539356
-
The common intrusion detection framework-data formats
-
March
-
Stuart Staniford-Chen, Brian Tung, Phil Porras, Cliff Kahn, Dan Schnackenberg, Rich Feiertag and Maureen Stillman, The common intrusion detection framework-data formats, Internet drade draft-ietf-cidf-data-formats- 00.txt (March 1998).
-
(1998)
Internet Drade Draft-Ietf-Cidf-Data-Formats-00.Txt
-
-
Staniford-Chen, S.1
Tung, B.2
Porras, P.3
Kahn, C.4
Schnackenberg, D.5
Feiertag, R.6
Stillman, M.7
-
33
-
-
83455245674
-
-
WheelGroup Corporation, available from the company's website at
-
WheelGroup Corporation, Brochure of the netranger intrusion detection system, available from the company's website at http://www/wheelgroup.com/ netrangr/netranger-broch.html.
-
Brochure of the Netranger Intrusion Detection System
-
-
|