-
1
-
-
0006103497
-
A standard audit trail format
-
Baltimore, Maryland, Oct. 10-13,. National Institute of Standards and Technology/National Computer Security Center
-
M. Bishop. A standard audit trail format. In Proceedings of the 18th National Information Systems Security Conference, pages 136-145, Baltimore, Maryland, Oct. 10-13, 1995. National Institute of Standards and Technology/National Computer Security Center
-
(1995)
Proceedings of the 18th National Information Systems Security Conference
, pp. 136-145
-
-
Bishop, M.1
-
2
-
-
84958742099
-
A tool for pro-active defense against the buffer overrun attack
-
J.-J. Quisquater et al., editors, Louvainla-Neuve, Belgium, Sept. 16-18, Springer-Verlag
-
D. Bruschi, E. Rosti, and R. Banfi. A tool for pro-active defense against the buffer overrun attack. In J.-J. Quisquater et al., editors, Computer Security-Proceedings of ESORICS 98, volume 1485 of LNCS, pages 17-31, Louvainla-Neuve, Belgium, Sept. 16-18, 1998. Springer-Verlag
-
(1998)
Computer Security-Proceedings of ESORICS 98, Volume 1485 of LNCS
, pp. 17-31
-
-
Bruschi, D.1
Rosti, E.2
Banfi, R.3
-
3
-
-
63449132197
-
-
Carnegie Mellon University, Pittsburgh, PA 15213-3890, USA. Buffer Overflow in Sun Solstice AdminSuite Daemon sadmind, Dec. 14, . CERT Advisory CA-1999-16
-
CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213-3890, USA. Buffer Overflow in Sun Solstice AdminSuite Daemon sadmind, Dec. 14, 1999. CERT Advisory CA-1999-16, http: //www.cert.org/advisories/CA-1999-16.html
-
(1999)
Software Engineering Institute
-
-
-
4
-
-
0006025721
-
Identification of host audit data to detect attacks on low-level IP vulnerabilities
-
T. E. Daniels and E. H. Spafford. Identification of host audit data to detect attacks on low-level IP vulnerabilities. Journal of Computer Security, 7(1):3-35, 1999
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 3-35
-
-
Daniels, T.E.1
Spafford, E.H.2
-
6
-
-
79953123891
-
Better logging through formality: Applying formal specification techniques to improve audit logs and log consumers
-
H. Debar, L. Me, and S. F. Wu, editors Toulouse, France, Oct. 2-4, . Springer-Verlag
-
C. Flack and M. J. Atallah. Better logging through formality: Applying formal specification techniques to improve audit logs and log consumers. In H. Debar, L. Me, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), volume 1907 of LNCS, pages 1-16, Toulouse, France, Oct. 2-4, 2000. Springer-Verlag
-
(2000)
Recent Advances in Intrusion Detection (RAID 2000), Volume 1907 of LNCS
, pp. 1-16
-
-
Flack, C.1
Atallah, M.J.2
-
7
-
-
84969573885
-
ASAX: Software architecture and rule-based language for universal audit trail analysis
-
Y. Deswarte et al., editors, Toulouse, France, Nov. 23-25, . Springer-Verlag
-
J. Habra, B. Le Charlier, A. Mounji, and I. Mathieu. ASAX: Software architecture and rule-based language for universal audit trail analysis. In Y. Deswarte et al., editors, Computer Security-Proceedings of ESORICS 92, volume 648 of LNCS, pages 435-450, Toulouse, France, Nov. 23-25, 1992. Springer-Verlag
-
(1992)
Computer Security-Proceedings of ESORICS 92, Volume 648 of LNCS
, pp. 435-450
-
-
Habra, J.1
Le Charlier, B.2
Mounji, A.3
Mathieu, I.4
-
9
-
-
0027150412
-
USTAT: A real-time intrusion detection system for UNIX
-
Oakland, California, May 24-26
-
K. Ilgun. USTAT: A real-time intrusion detection system for UNIX. In Proceedings of the 1993 IEEE Symposium on Security and Privacy, pages 16-28, Oakland, California, May 24-26, 1993
-
(1993)
Proceedings of the 1993 IEEE Symposium on Security and Privacy
, pp. 16-28
-
-
Ilgun, K.1
-
10
-
-
84940110274
-
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
-
Oakland, California, May 9-12
-
U. Lindqvist and P. A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 9-12, 1999
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
11
-
-
84944222170
-
Analysis and results of the 1999 DARPA off-line intrusion detection evaluation
-
H. Debar, L. Me, and S. F. Wu, editors Toulouse, France, Oct. 2-4, . Springer-Verlag
-
R. Lippmann, J.W. Haines, D. J. Fried, J. Korba, and K. Das. Analysis and results of the 1999 DARPA off-line intrusion detection evaluation. In H. Debar, L. Me, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), volume 1907 of LNCS, pages 162-182, Toulouse, France, Oct. 2-4, 2000. Springer-Verlag
-
(2000)
Recent Advances in Intrusion Detection (RAID 2000), Volume 1907 of LNCS
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
14
-
-
0006100649
-
Smashing the stack for fun and profit
-
Nov. 8
-
A. One. Smashing the stack for fun and profit. Phrack Magazine, 7(49), Nov. 8, 1996. http://www.fc.net/phrack/files/ p49/p49-14
-
(1996)
Phrack Magazine
, vol.7
, Issue.49
-
-
One, A.1
-
16
-
-
84873309550
-
Penetration state transition analysis: A rule-based intrusion detection approach
-
San Antonio, Texas, Nov. 30-Dec. 4
-
P. A. Porras and R. A. Kemmerer. Penetration state transition analysis: A rule-based intrusion detection approach. In Proceedings of the Eighth Annual Computer Security Applications Conference, pages 220-229, San Antonio, Texas, Nov. 30-Dec. 4, 1992
-
(1992)
Proceedings of the Eighth Annual Computer Security Applications Conference
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
17
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, Maryland, Oct. 7-10, . National Institute of Standards and Technology/ National Computer Security Center
-
P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353-365, Baltimore, Maryland, Oct. 7-10, 1997. National Institute of Standards and Technology/ National Computer Security Center
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
18
-
-
0028711786
-
Audit reduction and misuse detection in heterogeneous environments: Framework and application
-
Orlando, Florida, Dec. 5-9
-
P. Proctor. Audit reduction and misuse detection in heterogeneous environments: Framework and application. In Proceedings of the Tenth Annual Computer Security Applications Conference, pages 117-125, Orlando, Florida, Dec. 5-9, 1994
-
(1994)
Proceedings of the Tenth Annual Computer Security Applications Conference
, pp. 117-125
-
-
Proctor, P.1
-
19
-
-
0004145058
-
-
Technical report, Secure Networks, Inc., Calgary, Alberta, Canada, Jan
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., Calgary, Alberta, Canada, Jan. 1998. http://www.clark.net/roesch/idspaper.html
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
20
-
-
2942645420
-
Expert systems in intrusion detection: A case study
-
Baltimore, Maryland, Oct. 17-20,. National Institute of Standards and Technology/ National Computer Security Center
-
M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A. Whitehurst. Expert systems in intrusion detection: A case study. In Proceedings of the 11th National Computer Security Conference, pages 74-81, Baltimore, Maryland, Oct. 17-20, 1988. National Institute of Standards and Technology/ National Computer Security Center
-
(1988)
Proceedings of the 11th National Computer Security Conference
, pp. 74-81
-
-
Sebring, M.M.1
Shellhouse, E.2
Hanna, M.E.3
Whitehurst, R.A.4
-
21
-
-
84949279540
-
Sun microsystems, inc., 901 san antonio road, palo alto, ca 94303, USA
-
Solaris 7, Oct
-
Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, CA 94303, USA. SunSHIELD Basic Security Module Guide, Solaris 7, Oct. 1998. Part No. 805-2635-10
-
(1998)
SunSHIELD Basic Security Module Guide
-
-
-
23
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
H. Debar, L. Me, and S. F. Wu, editors, Toulouse, France, Oct. 2-4, . Springer-Verlag
-
A. Valdes and K. Skinner. Adaptive, model-based monitoring for cyber attack detection. In H. Debar, L. Me, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), volume 1907 of LNCS, pages 80-92, Toulouse, France, Oct. 2-4, 2000. Springer-Verlag
-
(2000)
Recent Advances in Intrusion Detection (RAID 2000), Volume 1907 of LNCS
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
|