-
1
-
-
84861179308
-
-
SANS
-
SANS, "The Top Cyber Security Risks," http://www.sans.org/top- cyber-security-risks/, 2011.
-
(2011)
The Top Cyber Security Risks
-
-
-
2
-
-
84861150187
-
-
National Vulnerability Database
-
National Vulnerability Database, "Vulnerability Summary for CVE-2010-4332," http://web.nvd.nist.gov/view/vuln/detail? vulnId= CVE-2010-4332, 2011.
-
(2011)
Vulnerability Summary for CVE-2010-4332
-
-
-
3
-
-
84861124610
-
-
National Vulnerability Database
-
National Vulnerability Database, "Vulnerability Summary for CVE-2010-4333," http://web.nvd.nist.gov/view/vuln/detail? vulnId=CVE-2010-4333, 2011.
-
(2011)
Vulnerability Summary for CVE-2010-4333
-
-
-
4
-
-
84861121279
-
-
Autobench, http://www.xenoclast.org/autobench/, 2011.
-
(2011)
Autobench
-
-
-
7
-
-
84861144136
-
-
greensql
-
greensql, http://www.greensql.net/, 2011.
-
(2011)
-
-
-
8
-
-
84861144132
-
-
httperf
-
httperf, http://www.hpl.hp.com/research/linux/httperf/, 2011.
-
(2011)
-
-
-
9
-
-
84861179727
-
-
httpload
-
httpload, http://www.acme.com/software/http-load/, 2011.
-
(2011)
-
-
-
10
-
-
84861144230
-
-
Joomla cms
-
Joomla cms, http://www.joomla.org/, 2011.
-
(2011)
-
-
-
11
-
-
84861144225
-
-
Linux-vserver
-
Linux-vserver, http://linux-vserver.org/, 2011.
-
(2011)
-
-
-
12
-
-
84861144228
-
-
metasploit
-
metasploit, http://www.metasploit.com/, 2011.
-
(2011)
-
-
-
13
-
-
84861144229
-
-
nikto
-
nikto, http://cirt.net/nikto2, 2011.
-
(2011)
-
-
-
14
-
-
84861144226
-
-
Openvz
-
Openvz, http://wiki.openvz.org, 2011.
-
(2011)
-
-
-
15
-
-
84861144227
-
-
Seleniumhq
-
Seleniumhq, http://seleniumhq.org/, 2011.
-
(2011)
-
-
-
16
-
-
84861179729
-
-
sqlmap
-
sqlmap, http://sqlmap.sourceforge.net/, 2011.
-
(2011)
-
-
-
17
-
-
84863886319
-
-
"Virtuozzo Containers," http://www.parallels.com/products/ pvc45/, 2011.
-
(2011)
Virtuozzo Containers
-
-
-
18
-
-
84861165536
-
-
"Wordpress," http://www.wordpress.org/, 2011.
-
(2011)
Wordpress
-
-
-
19
-
-
84861144134
-
-
"Wordpress Bug," http://core.trac.wordpress.org/ticket/5487, 2011.
-
(2011)
Wordpress Bug
-
-
-
22
-
-
74849109764
-
Syntax, and semantics-based signature database for hybrid intrusion detection systems
-
B.I.A. Barry and H.A. Chan, "Syntax, and Semantics-Based Signature Database for Hybrid Intrusion Detection Systems," Security and Comm. Networks, vol. 2, no. 6, pp. 457-475, 2009.
-
(2009)
Security and Comm. Networks
, vol.2
, Issue.6
, pp. 457-475
-
-
Barry, B.I.A.1
Chan, H.A.2
-
25
-
-
70349754986
-
Swaddler: An approach for the anomaly-based detection of state violations in web applications
-
M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna, "Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications," Proc. Int'l Symp. Recent Advances in Intrusion Detection (RAID '07), 2007.
-
(2007)
Proc. Int'l Symp. Recent Advances in Intrusion Detection (RAID '07)
-
-
Cova, M.1
Balzarotti, D.2
Felmetsger, V.3
Vigna, G.4
-
26
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi, "Towards a Taxonomy of Intrusion-Detection Systems," Computer Networks, vol. 31, no. 9, pp. 805-822, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.9
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
27
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
V. Felmetsger, L. Cavedon, C. Kruegel, and G. Vigna, "Toward Automated Detection of Logic Vulnerabilities in Web Applications," Proc. USENIX Security Symp., 2010.
-
(2010)
Proc. USENIX Security Symp.
-
-
Felmetsger, V.1
Cavedon, L.2
Kruegel, C.3
Vigna, G.4
-
28
-
-
2442430540
-
A data mining approach for database intrusion detection
-
H. Haddad, A. Omicini, R.L. Wainwright, and L.M. Liebrock, eds.
-
Y. Hu and B. Panda, "A Data Mining Approach for Database Intrusion Detection," Proc. ACM Symp. Applied Computing (SAC), H. Haddad, A. Omicini, R.L. Wainwright, and L.M. Liebrock, eds., 2004.
-
(2004)
Proc. ACM Symp. Applied Computing (SAC)
-
-
Hu, Y.1
Panda, B.2
-
29
-
-
70349260987
-
Efficiently tracking application interactions using lightweight virtualization
-
Y. Huang, A. Stavrou, A.K. Ghosh, and S. Jajodia, "Efficiently Tracking Application Interactions Using Lightweight Virtualization," Proc. First ACM Workshop Virtual Machine Security, 2008.
-
(2008)
Proc. First ACM Workshop Virtual Machine Security
-
-
Huang, Y.1
Stavrou, A.2
Ghosh, A.K.3
Jajodia, S.4
-
30
-
-
85084163246
-
Autograph: Toward automated distributed worm signature detection
-
H.-A. Kim and B. Karp, "Autograph: Toward Automated Distributed Worm Signature Detection," Proc. USENIX Security Symp., 2004.
-
(2004)
Proc. USENIX Security Symp.
-
-
Kim, H.-A.1
Karp, B.2
-
33
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Liang and Sekar, "Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers," SIGSAC: Proc. 12th ACM Conf. Computer and Comm. Security, 2005.
-
(2005)
SIGSAC: Proc. 12th ACM Conf. Computer and Comm. Security
-
-
Liang1
Sekar2
-
35
-
-
70449632684
-
CLAMP: Practical prevention of large-scale data leaks
-
B. Parno, J.M. McCune, D. Wendlandt, D.G. Andersen, and A. Perrig, "CLAMP: Practical Prevention of Large-Scale Data Leaks," Proc. IEEE Symp. Security and Privacy, 2009.
-
(2009)
Proc. IEEE Symp. Security and Privacy
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
-
37
-
-
85077127256
-
Apiary: Easy-to-use desktop application fault containment on commodity operating systems
-
S. Potter and J. Nieh, "Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems," Proc. USENIX Ann. Technical Conf., 2010.
-
(2010)
Proc. USENIX Ann. Technical Conf.
-
-
Potter, S.1
Nieh, J.2
-
38
-
-
85180537732
-
Effective anomaly detection with scarce training data
-
W. Robertson, F. Maggi, C. Kruegel, and G. Vigna, "Effective Anomaly Detection with Scarce Training Data," Proc. Network and Distributed System Security Symp. (NDSS), 2010.
-
(2010)
Proc. Network and Distributed System Security Symp. (NDSS)
-
-
Robertson, W.1
Maggi, F.2
Kruegel, C.3
Vigna, G.4
-
43
-
-
79951740439
-
-
technical report, Dept. of Computer Science, North Carolina State Univ.
-
Y. Shin, L. Williams, and T. Xie, "SQLUnitgen: Test Case Generation for SQL Injection Detection," technical report, Dept. of Computer Science, North Carolina State Univ., 2006.
-
(2006)
SQLUnitgen: Test Case Generation for SQL Injection Detection
-
-
Shin, Y.1
Williams, L.2
Xie, T.3
-
44
-
-
70350394979
-
Database intrusion detection using weighted sequence mining
-
A. Srivastava, S. Sural, and A.K. Majumdar, "Database Intrusion Detection Using Weighted Sequence Mining," J. Computers, vol. 1, no. 4, pp. 8-17, 2006.
-
(2006)
J. Computers
, vol.1
, Issue.4
, pp. 8-17
-
-
Srivastava, A.1
Sural, S.2
Majumdar, A.K.3
-
45
-
-
74049136397
-
Keep your friends close: The necessity for updating an anomaly sensor with legitimate environment changes
-
A. Stavrou, G. Cretu-Ciocarlie, M. Locasto, and S. Stolfo, "Keep Your Friends Close: The Necessity for Updating an Anomaly Sensor with Legitimate Environment Changes," Proc. Second ACM Workshop Security and Artificial Intelligence, 2009.
-
(2009)
Proc. Second ACM Workshop Security and Artificial Intelligence
-
-
Stavrou, A.1
Cretu-Ciocarlie, G.2
Locasto, M.3
Stolfo, S.4
-
46
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Nov.
-
G.E. Suh, J.W. Lee, D. Zhang, and S. Devadas, "Secure Program Execution via Dynamic Information Flow Tracking," ACM SIGPLAN Notices, vol. 39, no. 11, pp. 85-96, Nov. 2004.
-
(2004)
ACM SIGPLAN Notices
, vol.39
, Issue.11
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
47
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
July-Sept.
-
F. Valeur, G. Vigna, C. Krü gel, and R.A. Kemmerer, "A Comprehensive Approach to Intrusion Detection Alert Correlation," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 3, pp. 146-169, July-Sept. 2004.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Krügel, C.3
Kemmerer, R.A.4
-
48
-
-
0037105910
-
Intrusion detection techniques and approaches
-
DOI 10.1016/S0140-3664(02)00037-3, PII S0140366402000373
-
T. Verwoerd and R. Hunt, "Intrusion Detection Techniques and Approaches," Computer Comm., vol. 25, no. 15, pp. 1356-1365, 2002. (Pubitemid 34506182)
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
49
-
-
62349108537
-
A stateful intrusion detection system for world-wide web servers
-
G. Vigna, W.K. Robertson, V. Kher, and R.A. Kemmerer, "A Stateful Intrusion Detection System for World-Wide Web Servers," Proc. Ann. Computer Security Applications Conf. (ACSAC '03), 2003.
-
(2003)
Proc. Ann. Computer Security Applications Conf. (ACSAC '03)
-
-
Vigna, G.1
Robertson, W.K.2
Kher, V.3
Kemmerer, R.A.4
-
50
-
-
68149139611
-
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries
-
G. Vigna, F. Valeur, D. Balzarotti, W.K. Robertson, C. Kruegel, and E. Kirda, "Reducing Errors in the Anomaly-Based Detection of Web-Based Attacks through the Combined Analysis of Web Requests and SQL Queries," J. Computer Security, vol. 17, no. 3, pp. 305-329, 2009.
-
(2009)
J. Computer Security
, vol.17
, Issue.3
, pp. 305-329
-
-
Vigna, G.1
Valeur, F.2
Balzarotti, D.3
Robertson, W.K.4
Kruegel, C.5
Kirda, E.6
-
51
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krü gel, and G. Vigna, "Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis," Proc. Network and Distributed System Security Symp. (NDSS '07), 2007.
-
(2007)
Proc. Network and Distributed System Security Symp. (NDSS '07)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Krügel, C.5
Vigna, G.6
|