-
1
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R. Lippmann, J. Haines, D. Fried, J. Korba, K. Das, "The 1999 DARPA off-line intrusion detection evaluation," Computer Networks, 34, 2000, 579-595.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
2
-
-
84944222170
-
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
-
Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000 Toulouse, France, October 2000, Proceedings. H. Debar, L. Me and S. F. Wu, (Eds.) Springer Verlag
-
R. P. Lippmann and J. Haines "Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation" in Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000 Toulouse, France, October 2000, Proceedings. H. Debar, L. Me and S. F. Wu, (Eds.) Springer Verlag. Lectures in Computer Science Vol. 1907, 2000, pp. 162-182.
-
(2000)
Lectures in Computer Science
, vol.1907
, pp. 162-182
-
-
Lippmann, R.P.1
Haines, J.2
-
3
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
N. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. A. Olsson, "A methodology for testing intrusion detection systems," IEEE Transactions on Software Engineering, 22, 1996, pp. 719-729.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
4
-
-
3643079262
-
A Software Platform for Testing Intrusion Detection Systems
-
September/October
-
N. Puketza, M. Chung, R. A. Olsson, and B. Mukherjee, "A Software Platform for Testing Intrusion Detection Systems," IEEE Software, September/October, 1997, pp 43-51.
-
(1997)
IEEE Software
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.A.3
Mukherjee, B.4
-
5
-
-
84962260018
-
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation
-
January IEEE Press
-
Richard P. Lippmann, David J. Fried, Isaac Graf, Joshua W. Haines, Kristopher R. Kendall, David McClung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunningham, and Marc A. Zissman, "Evaluating Intrusion Detection Systems: the 1998 DARPA Off-Line Intrusion Detection Evaluation", in Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), Vol. 2, January 2000, IEEE Press.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX)
, vol.2
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
6
-
-
84964420289
-
-
http://www.ll.mit.edu/IST/ideval/index.html
-
-
-
-
7
-
-
84962284852
-
Red-Teaming of Advanced Information Assurance Concepts
-
Hilton Head, SC, Jan. 25-27
-
B. Wood and R. Duggan, "Red-Teaming of Advanced Information Assurance Concepts," Proceedings of DARPA Information Survivability Conference and Exposition, Hilton Head, SC, Jan. 25-27, 2000
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition
-
-
Wood, B.1
Duggan, R.2
-
9
-
-
84964448541
-
-
Solaris sadmind vulnerability: http://www.securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D866
-
Solaris Sadmind Vulnerability
-
-
-
10
-
-
0006544824
-
-
Mstream DDoS tool: http://www.securityfocus.com/archive/82/57690
-
Mstream DDoS Tool
-
-
-
11
-
-
84964537293
-
-
http://www.ietf.org/html.charters/idwg-charter.html
-
-
-
-
12
-
-
0004145058
-
-
Secure Networks, Inc. Report, January
-
T. H. Ptacek and T. N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection", Secure Networks, Inc. Report, January 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
13
-
-
77952511175
-
Design and Procedures of the 1999 DARPA Off-Line Intrusion Detection Evaluation
-
In Press, December
-
J. Haines, R. Lippmann, D. Fried, J. Korba, and K. Das, "Design and Procedures of the 1999 DARPA Off-Line Intrusion Detection Evaluation", MIT Lincoln Laboratory Technical Report, In Press, December 2000.
-
(2000)
MIT Lincoln Laboratory Technical Report
-
-
Haines, J.1
Lippmann, R.2
Fried, D.3
Korba, J.4
Das, K.5
-
18
-
-
84964544288
-
-
Skaion Corporation: terry@skaion.com or steve@skaion.com
-
The Linux modification is available from Skaion Corporation: terry@skaion.com or steve@skaion.com.
-
The Linux Modification
-
-
-
19
-
-
84944255863
-
Using Rule-Based Activity Descriptions to Evaluate Intrusion Detection Systems
-
Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000 Toulouse, France, October 2000, Proceedings. H. Debar, L. Me and S. F. Wu, (Eds.) Springer Verlag
-
D. Alessandri, "Using Rule-Based Activity Descriptions to Evaluate Intrusion Detection Systems," in Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000 Toulouse, France, October 2000, Proceedings. H. Debar, L. Me and S. F. Wu, (Eds.) Springer Verlag. Lectures in Computer Science Vol. 1907, 2000, pp. 183-196.
-
(2000)
Lectures in Computer Science
, vol.1907
, pp. 183-196
-
-
Alessandri, D.1
-
20
-
-
84964449841
-
-
http://www.nmap.org
-
-
-
-
21
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems", Communications of the ACM, 42(7), pp. 53-61 (1999)
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
22
-
-
84964544260
-
-
Send email to lariat@sst.ll.mit.edu for information
-
Send email to lariat@sst.ll.mit.edu for information
-
-
-
|