-
1
-
-
55649089217
-
Automated containment of rootkits attacks
-
Baliga, A., Iftode, L., Chen, X.: Automated containment of rootkits attacks. Computers & Security 27(7-8), 323-334 (2008)
-
(2008)
Computers & Security
, vol.27
, Issue.7-8
, pp. 323-334
-
-
Baliga, A.1
Iftode, L.2
Chen, X.3
-
2
-
-
84862248155
-
An Active Host-Based Detection Mechanism for ARP-Related Attacks
-
Barbhuiya, F.A., Roopa, S., Ratti, R., Hubballi, N., Biswas, S., Sur, A., Nandi, S., Ramachandran, V.: An Active Host-Based Detection Mechanism for ARP-Related Attacks. Advances in Networks and Communications 132, 432-443 (2011)
-
(2011)
Advances in Networks and Communications
, vol.132
, pp. 432-443
-
-
Barbhuiya, F.A.1
Roopa, S.2
Ratti, R.3
Hubballi, N.4
Biswas, S.5
Sur, A.6
Nandi, S.7
Ramachandran, V.8
-
3
-
-
85076925998
-
Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks
-
USENIX Association, Berkeley
-
Gummadi, R., Balakrishnan, H., Maniatis, P., Ratnasamy, S.: Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks. In: NSDI 2009 Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, Berkeley (2009)
-
(2009)
NSDI 2009 Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation
-
-
Gummadi, R.1
Balakrishnan, H.2
Maniatis, P.3
Ratnasamy, S.4
-
4
-
-
84866013498
-
Host-Based Anomaly Intrusion Detection
-
Springer, Heidelberg
-
Hu, J.: Host-Based Anomaly Intrusion Detection. In: Handbook of Information and Communication Security, pp. 235-255. Springer, Heidelberg (2010)
-
(2010)
Handbook of Information and Communication Security
, pp. 235-255
-
-
Hu, J.1
-
5
-
-
77955711605
-
A guest-transparent file integrity monitoring method in virtualization environment
-
Jin, H., Xiang, G., Zou, D., Zhao, F., Li, M., Yu, C.: A guest-transparent file integrity monitoring method in virtualization environment. Computers & Mathematics with Applications 60(2), 256-266 (2010)
-
(2010)
Computers & Mathematics with Applications
, vol.60
, Issue.2
, pp. 256-266
-
-
Jin, H.1
Xiang, G.2
Zou, D.3
Zhao, F.4
Li, M.5
Yu, C.6
-
7
-
-
84858658732
-
Recovery Based Architecture to Protect Hids Log Files using Time Stamps
-
Khurana, S.S., Bansal, D., Sofat, S.: Recovery Based Architecture to Protect Hids Log Files using Time Stamps. Journal of Emerging Technologies in Web Intelligence 2(2), 110-114 (2010)
-
(2010)
Journal of Emerging Technologies in Web Intelligence
, vol.2
, Issue.2
, pp. 110-114
-
-
Khurana, S.S.1
Bansal, D.2
Sofat, S.3
-
8
-
-
85076206522
-
Effective and Efficient Malware Detection at the End Host
-
USENIX Association, Berkeley
-
Kolbitsch, C., Comparetti, P.M., Kruegel, C., Kirda, E., Zhou, X., Wang, X.: Effective and Efficient Malware Detection at the End Host. In: SSYM 2009 Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association, Berkeley (2009)
-
(2009)
SSYM 2009 Proceedings of the 18th Conference on USENIX Security Symposium
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
9
-
-
79956297873
-
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host
-
Bao, F., Weng, J. (eds.) ISPEC 2011. Springer, Heidelberg
-
Kwon, J., Lee, J., Lee, H.: Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 343-361. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6672
, pp. 343-361
-
-
Kwon, J.1
Lee, J.2
Lee, H.3
-
10
-
-
41549111606
-
PROBE: A Process Behavior-Based Host Intrusion Prevention System
-
Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. Springer, Heidelberg
-
Kwon, M., Jeong, K., Lee, H.: PROBE: A Process Behavior-Based Host Intrusion Prevention System. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 203-217. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4991
, pp. 203-217
-
-
Kwon, M.1
Jeong, K.2
Lee, H.3
-
11
-
-
33846198398
-
Protecting host-based intrusion detectors through virtual machines
-
Laureano, M., Maziero, C., Jamhour, E.: Protecting host-based intrusion detectors through virtual machines. Computer Networks: The International Journal of Computer and Telecommunications Networking 51(5), 1275-1283 (2007)
-
(2007)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.51
, Issue.5
, pp. 1275-1283
-
-
Laureano, M.1
Maziero, C.2
Jamhour, E.3
-
12
-
-
68149157197
-
DDoSniffer: Detecting DDOS Attack at the Source Agents
-
Laurens, V., El Saddik, A., Dhar, P.: DDoSniffer: Detecting DDOS Attack at the Source Agents. International Journal of Advanced Media and Communication 3(3) (2009)
-
(2009)
International Journal of Advanced Media and Communication
, vol.3
, Issue.3
-
-
Laurens, V.1
El Saddik, A.2
Dhar, P.3
-
15
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
Ozyer, T., Alhajj, R., Barker, K.: Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. Journal of Network and Computer Applications - Special Issue: Network and Information Security: A Computational Intelligence Approach 30(1), 99-113 (2007)
-
(2007)
Journal of Network and Computer Applications - Special Issue: Network and Information Security: A Computational Intelligence Approach
, vol.30
, Issue.1
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
17
-
-
84889668111
-
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System
-
USENIX Association, Berkeley
-
Patil, S., Kashyap, A., Sivathanu, G., Zadok, E.: I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. In: LISA 2004 Proceedings of the 18th USENIX Conference on System Administration, pp. 67-78. USENIX Association, Berkeley (2004)
-
(2004)
LISA 2004 Proceedings of the 18th USENIX Conference on System Administration
, pp. 67-78
-
-
Patil, S.1
Kashyap, A.2
Sivathanu, G.3
Zadok, E.4
-
18
-
-
50249101677
-
Lares: An Architecture for Secure Active Monitoring Using Virtualization
-
May
-
Payne, B.D., Carbone, M., Sharif, M., Lee, W.: Lares: An Architecture for Secure Active Monitoring Using Virtualization. In: SP 2008 Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 233-247 (May 2008)
-
(2008)
SP 2008 Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
22
-
-
33244492171
-
Ensuring Data Integrity in Storage: Techniques and Applications
-
ACM, New York
-
Sivathanu, G., Wright, C.P., Zadok, E.: Ensuring Data Integrity in Storage: Techniques and Applications. In: StorageSS 2005 Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, pp. 26-36. ACM, New York (2005)
-
(2005)
StorageSS 2005 Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
, pp. 26-36
-
-
Sivathanu, G.1
Wright, C.P.2
Zadok, E.3
-
23
-
-
56549109177
-
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Srivastava, A., Giffin, J.: Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 39-58. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 39-58
-
-
Srivastava, A.1
Giffin, J.2
-
24
-
-
51949106400
-
A Behavior Based Approach to Host-Level Intrusion Detection Using Self-Organizing Maps
-
IEEE Computer Society, Washington, DC
-
Kola Sujatha, P., Kannan, A., Ragunath, S., Sindhu Bargavi, K., Githanjali, S.: A Behavior Based Approach to Host-Level Intrusion Detection Using Self-Organizing Maps. In: ICETET 2008 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology, pp. 1267-1271. IEEE Computer Society, Washington, DC (2008)
-
(2008)
ICETET 2008 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology
, pp. 1267-1271
-
-
Kola Sujatha, P.1
Kannan, A.2
Ragunath, S.3
Sindhu Bargavi, K.4
Githanjali, S.5
-
25
-
-
70349104195
-
Host-based traceback; tracking bot and C&C server
-
ACM, New York
-
Takemori, K., Fujinaga, M., Sayama, T., Nishigaki, M.: Host-based traceback; tracking bot and C&C server. In: ICUIMC 2009 Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM, New York (2009)
-
(2009)
ICUIMC 2009 Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
-
-
Takemori, K.1
Fujinaga, M.2
Sayama, T.3
Nishigaki, M.4
-
26
-
-
67249152348
-
Detection of Bot Infected PCs Using Destination-based IP and Domain Whitelists during a Non-operating Term
-
IEEE Computer Society, Washington, DC
-
Takemori, K., Nishigaki, M., Tomohiro, T., Yutaka, M.: Detection of Bot Infected PCs Using Destination-based IP and Domain Whitelists during a Non-operating Term. In: GLOBECOM 2008 Proceedings of the Global Communications Conference, pp. 2072-2077. IEEE Computer Society, Washington, DC (2008)
-
(2008)
GLOBECOM 2008 Proceedings of the Global Communications Conference
, pp. 2072-2077
-
-
Takemori, K.1
Nishigaki, M.2
Tomohiro, T.3
Yutaka, M.4
-
27
-
-
76549113940
-
User-Assisted Host-Based Detection of Outbound Malware Traffic
-
Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. Springer, Heidelberg
-
Xiong, H., Malhotra, P., Stefan, D., Wu, C., Yao, D.: User-Assisted Host-Based Detection of Outbound Malware Traffic. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 293-307. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5927
, pp. 293-307
-
-
Xiong, H.1
Malhotra, P.2
Stefan, D.3
Wu, C.4
Yao, D.5
-
28
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers & Security 29(1), 124-140 (2010)
-
(2010)
Computers & Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
|