-
1
-
-
33644921425
-
Configurable string matching hardware for speeding up intrusion detection
-
M. Aldwairi, T. Conte, and P. Franzon, "Configurable string matching hardware for speeding up intrusion detection," ACM SIGARCH Computer Architecture News, vol. 33, no. 1, pp. 99-107, 2005.
-
(2005)
ACM SIGARCH Computer Architecture News
, vol.33
, Issue.1
, pp. 99-107
-
-
Aldwairi, M.1
Conte, T.2
Franzon, P.3
-
2
-
-
33645589730
-
An Introduction to Intrusion Detection & Assessment
-
ICSA
-
R. Bace, An Introduction to Intrusion Detection & Assessment, Technical White Paper, ICSA, 1999.
-
(1999)
Technical White Paper
-
-
Bace, R.1
-
4
-
-
2642515264
-
Intrusion Detection Systems
-
R. Base and P. Mell, Intrusion Detection Systems, National Institute of Standards and Technology (NIST), Special Publication, vol. 51, pp. 800-831, 2001.
-
(2001)
National Institute of Standards and Technology (NIST), Special Publication
, vol.51
, pp. 800-831
-
-
Base, R.1
Mell, P.2
-
5
-
-
84875326922
-
-
D. Bailey, Sneeze. (http://archives.neohapsis.com/archives/snort/2001-08/0180.html)
-
Sneeze
-
-
Bailey, D.1
-
6
-
-
27544471466
-
Snort 2.1 Intrusion Detection: Syngress Media Inc
-
J. Beale, A. R. Baker, B. Caswell, and M. Poor, Snort 2.1 Intrusion Detection: Syngress Media Inc, 2004.
-
(2004)
-
-
Beale, J.1
Baker, A.R.2
Caswell, B.3
Poor, M.4
-
7
-
-
84856748550
-
A hybrid model for network security systems: Integrating intrusion detection system with survivability
-
T. Bhaskar, B. Narasimha Kamath, and S.D. Moitra, "A hybrid model for network security systems: Integrating intrusion detection system with survivability," International Journal of Network Security, vol. 7, no. 2, pp. 249-260, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 249-260
-
-
Bhaskar, T.1
Narasimha Kamath, B.2
Moitra, S.D.3
-
9
-
-
84875359389
-
Fun with Packets: Designing a Stick
-
Inc
-
G. Coretez, Fun with Packets: Designing a Stick, Endeavor Systems, Inc, 2002.
-
(2002)
Endeavor Systems
-
-
Coretez, G.1
-
10
-
-
35048879637
-
Honeystat: Local worm detection using honeypots
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen, "Honeystat: Local worm detection using honeypots," RAID 2004, LNCS 3224, pp. 39-58, 2004.
-
(2004)
RAID 2004, LNCS
, vol.3224
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
12
-
-
84875303745
-
-
IDSwakeup. (http://www.hsc.fr/ressources/outils/idswakeup/index.html.en)
-
IDSwakeup
-
-
-
13
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, and E. Vazquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges," Computers and Security, vol. 28, no. 1-2, pp. 18-28, 2009.
-
(2009)
Computers and Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
14
-
-
77956388396
-
Deciphering Detection Techniques: Part II Anomaly-based Intrusion Detection
-
F. Gong, Deciphering Detection Techniques: Part II Anomaly-based Intrusion Detection, White Paper, McAfee Security, 2003.
-
(2003)
White Paper, McAfee Security
-
-
Gong, F.1
-
15
-
-
34249865012
-
Research on intrusion detection and response: A survey
-
P. Kabiri and A. A. Ghorbani, "Research on intrusion detection and response: A survey," International Journal of Network Security, vol. 1, no. 2, pp. 84-102, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 84-102
-
-
Kabiri, P.1
Ghorbani, A.A.2
-
16
-
-
0004204715
-
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems
-
S. M. Thesis
-
K. Kendall, A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, S. M. Thesis, Massachusetts Institute of Technology, 1999.
-
(1999)
Massachusetts Institute of Technology
-
-
Kendall, K.1
-
17
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Twenty-Second Annual Joint Conference of the IEEE Computer and Comm-unications, pp. 1901-1910, 2003.
-
(2003)
in Twenty-Second Annual Joint Conference of the IEEE Computer and Comm-unications
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
18
-
-
0028430224
-
Network intrusion detection
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection," IEEE Network, vol. 8, no. 3, pp. 26-41, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
19
-
-
38149079834
-
A feature classi-fication scheme for network intrusion detection
-
I. V. Onut and A. A. Ghorbani, "A feature classi-fication scheme for network intrusion detection," International Journal of Network Security, vol. 5, no 1, pp. 1-15, 2007.
-
International Journal of Network Security
, vol.5
, Issue.1
, pp. 1-15
-
-
Onut, I.V.1
Ghorbani, A.A.2
-
22
-
-
84875318097
-
Snort Intrusion Detection 2.0
-
R. Russell, Snort Intrusion Detection 2.0, Syngress Pub., 2003.
-
(2003)
Syngress Pub
-
-
Russell, R.1
-
25
-
-
58149104386
-
Guide to Intrusion Detection and Prevention Systems (Idps)
-
K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (Idps), NIST Special Publication, vol. 8, pp. 800-894, 2007.
-
(2007)
NIST Special Publication
, vol.8
, pp. 800-894
-
-
Scarfone, K.1
Mell, P.2
-
28
-
-
84861386583
-
Dynamic multi-layer signature based intrusion detection system using mobile agents
-
M. Uddin, K. Khowaja, and A.A. Rehman, "Dynamic multi-layer signature based intrusion detection system using mobile agents," International Journal of Network Security & Its Applications (IJNSA), vol. 2, no. 4, pp. 129-141, 2010.
-
(2010)
International Journal of Network Security & Its Applications (IJNSA)
, vol.2
, Issue.4
, pp. 129-141
-
-
Uddin, M.1
Khowaja, K.2
Rehman, A.A.3
-
29
-
-
4544303625
-
Dynamic quarantine of Internet worms
-
C. Wong, C. Wang, D. Song, S. Bielski, and G. R. Ganger, "Dynamic quarantine of Internet worms," in Proceedings of the 2004 International Conference on Dependable Systems and Networks, pp. 73-82, 2004.
-
(2004)
Proceedings of the 2004 International Conference on Dependable Systems and Networks
, pp. 73-82
-
-
Wong, C.1
Wang, C.2
Song, D.3
Bielski, S.4
Ganger, G.R.5
-
30
-
-
80053156764
-
Techniques for Improving the Per-formance of Signature-based Network Intrusion Detection Systems
-
University of California
-
P. S. Wheeler, Techniques for Improving the Per-formance of Signature-based Network Intrusion Detection Systems, University of California, 2006.
-
(2006)
-
-
Wheeler, P.S.1
-
31
-
-
42549142161
-
Anomaly based network intrusion detection with unsupervised outlier detection
-
J. Zhang and M. Zulkernine, "Anomaly based network intrusion detection with unsupervised outlier detection," in IEEE International Conference on Communications, pp. 2388-2393, 2006.
-
(2006)
IEEE International Conference on Communications
, pp. 2388-2393
-
-
Zhang, J.1
Zulkernine, M.2
-
32
-
-
78049530653
-
An observation-centric analysis on the modeling of anomaly-based intrusion detection
-
Z. Zhang, H. Shen, and Y. Sang, "An observation-centric analysis on the modeling of anomaly-based intrusion detection," International Journal of Network Security, vol. 4, no. 3, pp. 292-305, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.3
, pp. 292-305
-
-
Zhang, Z.1
Shen, H.2
Sang, Y.3
|