-
2
-
-
14844307485
-
-
S. Aubert. Idswakeup. http://www.hsc.fr/ressources/outils/idswakeup/, 2000.
-
(2000)
Idswakeup
-
-
Aubert, S.1
-
4
-
-
0006064357
-
Addendum to "testing and evaluating computer intrusion detection systems"
-
September
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Addendum to "Testing and Evaluating Computer Intrusion Detection Systems". CACM, 42(9):15, September 1999.
-
(1999)
CACM
, vol.42
, Issue.9
, pp. 15
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
5
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
July
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Testing and Evaluating Computer Intrusion Detection Systems. CACM, 42(7):53-61, July 1999.
-
(1999)
CACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
6
-
-
18744400629
-
Translating snort rules to STATL scenarios
-
Davis, CA, October. Short paper presentation
-
S. Eckmann. Translating Snort Rules to STATL Scenarios. In Recent Advances in Intrusion Detection, Davis, CA, October 2001. Short paper presentation.
-
(2001)
Recent Advances in Intrusion Detection
-
-
Eckmann, S.1
-
7
-
-
15044348810
-
-
PhD thesis, Department of Computer Science, UCSB, Santa Barbara, CA, June
-
S.T. Eckmann. The STATL Attack Detection Language. PhD thesis, Department of Computer Science, UCSB, Santa Barbara, CA, June 2002.
-
(2002)
The STATL Attack Detection Language
-
-
Eckmann, S.T.1
-
8
-
-
33644535884
-
STATL: An attack language for state-based intrusion detection
-
Athens, Greece, November
-
S.T. Eckmann, G. Vigna, and R.A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. In Proceedings of the ACM Workshop on Intrusion Detection Systems, Athens, Greece, November 2000.
-
(2000)
Proceedings of the ACM Workshop on Intrusion Detection Systems
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
10
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Paul Helman and Gunar Liepins. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. In IEEE Transactions on Software Engineering, volume Vol 19, No. 9, pages 886-901, 1993.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
11
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection system
-
March
-
K. Ilgun, R.A. Kemmerer, and P.A. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
12
-
-
0004118981
-
-
Technical report, SRI International, Menlo Park, CA, March
-
H. S. Javitz and A. Valdes. The NIDES Statistical Component Description and Justification. Technical report, SRI International, Menlo Park, CA, March 1994.
-
(1994)
The NIDES Statistical Component Description and Justification
-
-
Javitz, H.S.1
Valdes, A.2
-
14
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
May
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
15
-
-
84940110274
-
Detecting computer and network misuse with the production-based expert system toolset (P-BEST)
-
Oakland, California, May
-
U. Lindqvist and P.A. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
16
-
-
84962260018
-
Evaluating intrustion detection systems: The 1998 DARPA offline intrusion detection evaluation
-
Hilton Head, SC, January
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman. Evaluating Intrustion Detection Systems: The 1998 DARPA Offline Intrusion Detection Evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition, Volume 2, Hilton Head, SC, January 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.2
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
17
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evalautions as performed by lincoln laboratory
-
November
-
J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evalautions as Performed by Lincoln Laboratory. ACM Transaction on Information and System Security, 3(4), November 2000.
-
(2000)
ACM Transaction on Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
19
-
-
39049123726
-
An Achilles' heel in signature-based IDS: Squealing false positives in SNORT
-
Davis, CA, October
-
S. Patton, W. Yurcik, and D. Doss. An Achilles' Heel in Signature-Based IDS: Squealing False Positives in SNORT. In Proceedings of RAID 2001, Davis, CA, October 2001.
-
(2001)
Proceedings of RAID 2001
-
-
Patton, S.1
Yurcik, W.2
Doss, D.3
-
23
-
-
84944764153
-
-
libnet
-
Mike Schiffman. libnet. http://packetfactory.net/libnet/, 2002.
-
(2002)
-
-
Schiffman, M.1
-
24
-
-
84944764154
-
-
Sniph. Snot. http://www.sec33.com/sniph/, 2001.
-
(2001)
-
-
|