-
1
-
-
0034823003
-
A trend analysis of exploitations
-
(Oakland, CA, May
-
Browne, H. K., Arbaugh, W. A., Hugh, J. M., and Fithen, W. L. A trend analysis of exploitations. In Proceedings of the 2001 IEEE Symposium on Security and Privacy (Oakland, CA, May 2001).
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
-
-
Browne, H.K.1
Arbaugh, W.A.2
Hugh, J.M.3
Fithen, W.L.4
-
2
-
-
84969376888
-
Multiple intrusion detection systems may be circumvented via %u encoding
-
Cert Coordination Center. Multiple intrusion detection systems may be circumvented via %u encoding. Cert-CC Vulnerability Note VU#548515, July 2001.
-
(2001)
Cert-Cc Vulnerability Note VU#548515
, Issue.July
-
-
-
4
-
-
0342432733
-
Reference Audit Information Generation for Intrusion Detection Systems
-
Debar, H., Dacier, M., and Wespi, A. Reference Audit Information Generation for Intrusion Detection Systems. In Proceedings of IFIPSEC’98 (Vienna, Austria and Budapest, Hungaria, August 31–September 4 1998), pp. 405–417.
-
(1998)
Proceedings of IFIPSEC’98 (Vienna, Austria and Budapest, Hungaria, August 31–September 4
, pp. 405-417
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
5
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
Davis, CA, USA, October
-
Debar, H., and Wespi, A. Aggregation and correlation of intrusion-detection alerts. In Proceedings of RAID 2001 (Davis, CA, USA, October 2001), pp. 85–103.
-
(2001)
Proceedings of RAID 2001
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
6
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Handley, M., Kreibich, C., and Paxson, V. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th USENIX Security Symposium (Washington, DC, August 13–17 2001).
-
(2001)
Proceedings of the 10Th USENIX Security Symposium (Washington, DC, August 13–17
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
7
-
-
84944222170
-
Analysis and results of the 1999 darpa off-line intrusion detection evaluation
-
October
-
Lippman, R., Haines, J. W., Fried, D. J., Korba, J., and Das, K. Analysis and results of the 1999 darpa off-line intrusion detection evaluation. In Proceedings of RAID 2000 (October 2000), pp. 162–182.
-
(2000)
In Proceedings of RAID
, vol.2000
, pp. 162-182
-
-
Lippman, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
8
-
-
84944239811
-
The 1998 lincoln laboratory ids evaluation, a critique
-
Toulouse, France, October
-
McHugh, J. The 1998 lincoln laboratory ids evaluation, a critique. In Proceedings of RAID 2000 (Toulouse, France, October 2000), pp. 145–161.
-
(2000)
Proceedings of RAID 2000
, pp. 145-161
-
-
McHugh, J.1
-
10
-
-
0004145058
-
-
Tech. rep., Secure Networks
-
Ptacek, T. H., and Newsham, T. N. Insertion, evasion, and denial of service: Eluding network intrusion detection. Tech. rep., Secure Networks, January 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
, Issue.January
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
11
-
-
3643079262
-
A software platform for testing intrusion detection systems
-
Puketza, N. J., Chung, M., Olsson, R. A., and Mukherjee, B. A software platform for testing intrusion detection systems. IEEE Software 14, 5 (September–October 1997), 43–51.
-
(1997)
IEEE Software 14, 5 (September–October
, pp. 43-51
-
-
Puketza, N.J.1
Chung, M.2
Olsson, R.A.3
Mukherjee, B.4
-
12
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
October
-
Puketza, N. J., Zhang, K., Chung, M., Mukherjee, B., and Olsson, R. A. A methodology for testing intrusion detection systems. IEEE Trans. Softw. Eng. 22, 10 (October 1996), 719–729.
-
(1996)
IEEE Trans. Softw. Eng
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
13
-
-
10444227706
-
-
Rain Forest Puppy. A look at whisker’s anti-ids tactics. http://www.wiretrip.net/rfp/pages/whitepapers/whiskerids.html, 1999.
-
(1999)
A Look at whisker’s Anti-Ids Tactics
-
-
|