-
2
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
November
-
P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 217-224, November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
4
-
-
0003907293
-
-
Macmillan Technology Publishing, Indianapolis
-
R. G. Bace. Intrusion Detection. Macmillan Technology Publishing, Indianapolis, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
9
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
LNCS
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
-
(2001)
Recent Advances in Intrusion Detection
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
10
-
-
35248841190
-
-
July, Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/
-
DEFCON. Def con capture the flag (CTF) contest. http://www.defcon.org/ html/defcon-8-post.html, July 2000. Archive accessible at http://wi2600.org/ mediawhore/mirrors/shmoo/.
-
(2000)
Def Con Capture the Flag (CTF) Contest
-
-
-
11
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S. T. Eckmann, G. Vigna, and R. A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
14
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering, 21(3):181-199, 1995.
-
(1995)
IEEE Transaction on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
15
-
-
0024880562
-
Similarity coefficients: Measures of cooccurence and association or simply measures of occurrence?
-
March
-
D. A. Jackson, K. M. Somers, and H. H. Harvey. Similarity coefficients: Measures of cooccurence and association or simply measures of occurrence? The American Naturalist, 133(3):436-453, March 1989.
-
(1989)
The American Naturalist
, vol.133
, Issue.3
, pp. 436-453
-
-
Jackson, D.A.1
Somers, K.M.2
Harvey, H.H.3
-
21
-
-
0031640906
-
Abstraction-based misuse detection: High-level specifications and adaptable strategies
-
Rockport, MA, June
-
J. Lin, X. S. Wang, and S. Jajodia. Abstraction-based misuse detection: High-level specifications and adaptable strategies. In Proceedings of the 11th Computer Security Foundations Workshop, pages 190-201, Rockport, MA, June 1998.
-
(1998)
Proceedings of the 11th Computer Security Foundations Workshop
, pp. 190-201
-
-
Lin, J.1
Wang, X.S.2
Jajodia, S.3
-
22
-
-
0034301662
-
A data mining analysis of RTID alarms
-
S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz. A data mining analysis of RTID alarms. Computer Networks, 34:571-577, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
24
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
B. Morin, L. Mé, H. Debar, and M. Ducassé. M2D2: A formal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 115-137, 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
25
-
-
0028430224
-
Network intrusion detection
-
May
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt. Network intrusion detection. IEEE Network, 8(3):26-41, May 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
26
-
-
84958963784
-
Analyzing intensive intrusion alerts via correlation
-
Zurich, Switzerland, October
-
P. Ning, Y. Cui, and D. S Reeves. Analyzing intensive intrusion alerts via correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 74-94, Zurich, Switzerland, October 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 74-94
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
27
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, D. C., November
-
P. Ning, Y. Cui, and D. S Reeves. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 245-254, Washington, D. C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
30
-
-
84891998613
-
-
Accessed on April 30, 2003
-
Packet storm. http://packetstormsecurity.nl. Accessed on April 30, 2003.
-
-
-
-
33
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1/2):189-209, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 189-209
-
-
Ramakrishnan, C.R.1
Sekar, R.2
-
35
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
May
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of IEEE Symposium on Security and Privacy, May 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
36
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. A. Hoagland, and J. M. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
39
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna and R. A. Kemmerer. NetSTAT: A network-based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
|