-
2
-
-
84928016636
-
The Base-Rate Fallacy and the Difficulty of Intrusion Detection
-
August
-
S. Axelsson. The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security, 3(3):186–205, August 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
3
-
-
33751039507
-
Dataflow Anomaly Detection
-
Oakland, CA, USA, May IEEE Computer Society
-
S. Bhatkar, A. Chaturvedi, and R. Sekar. Dataflow Anomaly Detection. In Proceedings of the IEEE Symposium on Security and Privacy (S&P 2006), Oakland, CA, USA, May 2006. IEEE Computer Society.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2006)
-
-
Bhatkar, S.1
Chaturvedi, A.2
Sekar, R.3
-
4
-
-
85076268269
-
-
January
-
Breach Security, Inc. Breach WebDefend. http://www.breach.com/products/webdefend.html, January 2009.
-
(2009)
Breach WebDefend
-
-
-
5
-
-
2942533003
-
SAD: Web Session Anomaly Detection Based on Parameter Estimation
-
S. Cho and S. Cha. SAD: Web Session Anomaly Detection Based on Parameter Estimation. Computers & Security, 23(4):312–319, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.4
, pp. 312-319
-
-
Cho, S.1
Cha, S.2
-
6
-
-
77957980907
-
-
January
-
Citrix Systems, Inc. Citrix Application Firewall. http://www.citrix.com/English/PS2/products/product.asp?contentID=25636, January 2009.
-
(2009)
Citrix Application Firewall
-
-
-
8
-
-
50249170401
-
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
-
Oakland, CA, USA, May IEEE Computer Society
-
G. F. Cretu, A. Stavrou, M. E. Locasto, S. J. Stolfo, and A. D. Keromytis. Casting out Demons: Sanitizing Training Data for Anomaly Sensors. In Proceedings of the IEEE Symposium on Security and Privacy (S&P 2008), pages 81–95, Oakland, CA, USA, May 2008. IEEE Computer Society.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2008)
, pp. 81-95
-
-
Cretu, G. F.1
Stavrou, A.2
Locasto, M. E.3
Stolfo, S. J.4
Keromytis, A. D.5
-
11
-
-
79955470570
-
-
F5 Networks, Inc. January
-
F5 Networks, Inc. BIG-IP Application Security Manager. http://www.f5.com/products/big-ip/product-modules/ application-security-manager.html, January 2009.
-
(2009)
BIG-IP Application Security Manager
-
-
-
12
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Oakland, CA, USA, May IEEE Computer Society
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A Sense of Self for Unix Processes. In Proceedings of the IEEE Symposium on Security and Privacy (S&P 1996), pages 120–128, Oakland, CA, USA, May 1996. IEEE Computer Society.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy (S&P 1996)
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S. A.2
Somayaji, A.3
Longstaff, T. A.4
-
13
-
-
60649095147
-
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
-
Anaheim, CA, USA, December
-
V. Frias-Martinez, S. J. Stolfo, and A. D. Keromytis. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, USA, December 2008.
-
(2008)
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2008)
-
-
Frias-Martinez, V.1
Stolfo, S. J.2
Keromytis, A. D.3
-
14
-
-
33745644031
-
Environment-Sensitive Intrusion Detection
-
Springer-Verlag
-
J. T. Giffin, D. Dagon, S. Jha, W. Lee, and B. P. Miller. Environment-Sensitive Intrusion Detection. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), pages 185–206. Springer-Verlag, 2005.
-
(2005)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 185-206
-
-
Giffin, J. T.1
Dagon, D.2
Jha, S.3
Lee, W.4
Miller, B. P.5
-
15
-
-
57849112746
-
Modeling Unknown Web Attacks in Network Anomaly Detection
-
Washington, DC, USA, IEEE Computer Society
-
rd International Conference on Convergence and Hybrid Information Technology (ICCIT 2008), pages 112–116, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
rd International Conference on Convergence and Hybrid Information Technology (ICCIT 2008)
, pp. 112-116
-
-
Guangmin, L.1
-
16
-
-
0022018101
-
A probabilistic distance measure for hidden Markov models
-
B. Juang and L. Rabiner. A probabilistic distance measure for hidden Markov models. AT&T Bell Laboratories Technical Journal, 64(2):391–408, 1985.
-
(1985)
AT&T Bell Laboratories Technical Journal
, vol.64
, Issue.2
, pp. 391-408
-
-
Juang, B.1
Rabiner, L.2
-
17
-
-
62849113350
-
Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems
-
Austin, TX, USA, December IEEE Computer Society
-
S.-i. Kim and N. Nwanze. Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems. In Proceedings of the Performance, Computing and Communications Conference (IPCCC 2008), pages 517–523, Austin, TX, USA, December 2008. IEEE Computer Society.
-
(2008)
Proceedings of the Performance, Computing and Communications Conference (IPCCC 2008)
, pp. 517-523
-
-
Kim, S.-i.1
Nwanze, N.2
-
18
-
-
84944737204
-
Bayesian Event Classification for Intrusion Detection
-
Las Vegas, NV, USA, December
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Bayesian Event Classification for Intrusion Detection. In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003), Las Vegas, NV, USA, December 2003.
-
(2003)
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003)
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
19
-
-
18844395404
-
A Multi-model Approach to the Detection of Web-based Attacks
-
July
-
C. Kruegel, W. Robertson, and G. Vigna. A Multi-model Approach to the Detection of Web-based Attacks. Journal of Computer Networks, 48(5):717–738, July 2005.
-
(2005)
Journal of Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
21
-
-
84885774862
-
A Framework for Constructing Features and Models for Intrusion Detection Systems
-
W. Lee and S. J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security, 3(4):227–261, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S. J.2
-
27
-
-
77957701143
-
-
January
-
Miniwatts Marketing Group. World Internet Usage Statistics. http://www.internetworldstats.com/stats.htm, January 2009.
-
(2009)
World Internet Usage Statistics
-
-
-
28
-
-
33745201000
-
Anomalous System Call Detection
-
February
-
D. Mutz, F. Valeur, C. Kruegel, and G. Vigna. Anomalous System Call Detection. ACM Transactions on Information and System Security, 9(1):61–93, February 2006.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Kruegel, C.3
Vigna, G.4
-
30
-
-
83455223163
-
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
-
San Diego, CA, USA, February
-
W. Robertson, G. Vigna, C. Kruegel, and R. A. Kemmerer. Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, USA, February 2006.
-
(2006)
Proceedings of the Network and Distributed System Security Symposium (NDSS 2006)
-
-
Robertson, W.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R. A.4
-
31
-
-
0034829697
-
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
-
Oakland, CA, USA, May IEEE Computer Society
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), pages 144–155, Oakland, CA, USA, May 2001. IEEE Computer Society.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001)
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
32
-
-
0038011179
-
Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions
-
New York, NY, USA, ACM Press
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou. Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions. In Proceedings of the ACM Conference on Computer and Communications Security (CCS 2002), pages 265–274, New York, NY, USA, 2002. ACM Press.
-
(2002)
Proceedings of the ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
35
-
-
85180633963
-
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
-
San Diego, CA, USA, February
-
Y. Song, A. D. Keromytis, and S. J. Stolfo. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2009), San Diego, CA, USA, February 2009.
-
(2009)
Proceedings of the Network and Distributed System Security Symposium (NDSS 2009)
-
-
Song, Y.1
Keromytis, A. D.2
Stolfo, S. J.3
-
37
-
-
84946083373
-
Inducing Probabilistic Grammars by Bayesian Model Merging
-
A. Stolcke and S. Omohundro. Inducing Probabilistic Grammars by Bayesian Model Merging. Lecture Notes in Computer Science, pages 106–106, 1994.
-
(1994)
Lecture Notes in Computer Science
, pp. 106-106
-
-
Stolcke, A.1
Omohundro, S.2
-
39
-
-
20444456754
-
MORPHEUS: Motif Oriented Representations to Purge Hostile Events from Unlabeled Sequences
-
Washington DC, USA, ACM
-
G. Tandon, P. Chan, and D. Mitra. MORPHEUS: Motif Oriented Representations to Purge Hostile Events from Unlabeled Sequences. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pages 16–25, Washington DC, USA, 2004. ACM.
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 16-25
-
-
Tandon, G.1
Chan, P.2
Mitra, D.3
-
40
-
-
77954950954
-
-
Technical Report XIV, Symantec Corporation, April
-
D. Turner, M. Fossi, E. Johnson, T. Mark, J. Blackbird, S. Entwise, M. K. Low, D. McKinney, and C. Wueest. Symantec Global Internet Security Threat Report – Trends for 2008. Technical Report XIV, Symantec Corporation, April 2009.
-
(2009)
Symantec Global Internet Security Threat Report – Trends for 2008
-
-
Turner, D.1
Fossi, M.2
Johnson, E.3
Mark, T.4
Blackbird, J.5
Entwise, S.6
Low, M. K.7
McKinney, D.8
Wueest, C.9
-
41
-
-
84944220475
-
Adaptive, Model-based Monitoring for Cyber Attack Detection
-
H. Debar, L. Me, and F. Wu, editors, pages Toulouse, France, October Springer-Verlag
-
A. Valdes and K. Skinner. Adaptive, Model-based Monitoring for Cyber Attack Detection. In H. Debar, L. Me, and F. Wu, editors, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2000), number 1907 in Lecture Notes in Computer Science, pages 80–92, Toulouse, France, October 2000. Springer-Verlag.
-
(2000)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2000), number 1907 in Lecture Notes in Computer Science
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
42
-
-
0034836394
-
Intrusion Detection via Static Analysis
-
Oakland, CA, USA, IEEE Computer Society
-
D. Wagner and D. Dean. Intrusion Detection via Static Analysis. In Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), pages 156–168, Oakland, CA, USA, 2001. IEEE Computer Society.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001)
, pp. 156-168
-
-
Wagner, D.1
Dean, D.2
-
43
-
-
35348910615
-
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
-
Hamburg, GR, September Springer-Verlag
-
K. Wang, J. J. Parekh, and S. J. Stolfo. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, GR, September 2006. Springer-Verlag.
-
(2006)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2006)
-
-
Wang, K.1
Parekh, J. J.2
Stolfo, S. J.3
|