Unifying intrusion detection and forensic analysis via provenance awareness
暂无分享,去创建一个
[1] Elisa Bertino,et al. Secure Provenance Transmission for Streaming Data , 2013, IEEE Transactions on Knowledge and Data Engineering.
[2] Yulai Xie,et al. A hybrid approach for efficient provenance storage , 2012, CIKM '12.
[3] Kevin R. B. Butler,et al. Towards secure provenance-based access control in cloud environments , 2013, CODASPY.
[4] Andreas Haeberlen,et al. Secure network provenance , 2011, SOSP.
[5] Andrew P. Martin,et al. Trusted Computing and Provenance: Better Together , 2010, TaPP.
[6] Amin Vahdat,et al. Transparent Result Caching , 1997, USENIX Annual Technical Conference.
[7] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Thomas Moyer,et al. Trustworthy Whole-System Provenance for the Linux Kernel , 2015, USENIX Security Symposium.
[9] Salvatore J. Stolfo,et al. Host-based Anomaly Detection Using Wrapping File Systems , 2004 .
[10] Luo Si,et al. LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[11] Ethan L. Miller,et al. Tracking Emigrant Data via Transient Provenance , 2011, TaPP.
[12] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] Philip K. Chan,et al. On the Learning of System Call Attributes for Host-based Anomaly Detection , 2006, Int. J. Artif. Intell. Tools.
[14] Marianne Winslett,et al. Towards a Secure and Efficient System for End-to-End Provenance , 2010, TaPP.
[15] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[16] Margo I. Seltzer,et al. Layering in Provenance Systems , 2009, USENIX Annual Technical Conference.
[17] Fareed Zaffar,et al. Fine-grained tracking of Grid infections , 2010, 2010 11th IEEE/ACM International Conference on Grid Computing.
[18] Samuel T. King,et al. Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.
[19] Fan Long,et al. Principled Sampling for Anomaly Detection , 2015, NDSS.
[20] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.
[21] Fareed Zaffar,et al. Identifying the provenance of correlated anomalies , 2011, SAC '11.
[22] Salvatore J. Stolfo,et al. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.
[23] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[24] James Cheney,et al. A Formal Framework for Provenance Security , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[25] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[26] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.
[27] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[28] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[29] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[30] Erez Zadok,et al. Story Book: An Efficient Extensible Provenance Framework , 2009, Workshop on the Theory and Practice of Provenance.
[31] Sungryoul Lee,et al. Kargus: a highly-scalable software-based intrusion detection system , 2012, CCS.
[32] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[33] Jennifer Widom,et al. Trio: A System for Integrated Management of Data, Accuracy, and Lineage , 2004, CIDR.
[34] Brian D. Noble,et al. Using Provenance to Aid in Personal File Search , 2007, USENIX Annual Technical Conference.
[35] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[36] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[37] Jaroslaw Kozlak,et al. Probabilistic Anomaly Detection Based on System Calls Analysis , 2007, Comput. Sci..
[38] Margo I. Seltzer,et al. Securing Provenance , 2008, HotSec.
[39] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[40] Jing Zhang,et al. Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance , 2009, Secure Data Management.
[41] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[42] Wu-chi Feng,et al. Forensix: a robust, high-performance reconstruction system , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[43] Marianne Winslett,et al. Introducing secure provenance: problems and challenges , 2007, StorageSS '07.
[44] Patrick D. McDaniel,et al. Hi-Fi: collecting high-fidelity whole-system provenance , 2012, ACSAC '12.
[45] Barbara G. Ryder,et al. A Formal Framework for Program Anomaly Detection , 2015, RAID.
[46] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[47] Xuxian Jiang,et al. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[48] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[49] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[50] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[51] Margo I. Seltzer,et al. Provenance for the Cloud , 2010, FAST.
[52] James Frew,et al. Composing lineage metadata with XML for custom satellite-derived data products , 2004, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004..
[53] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[54] Michael Chow,et al. Eidetic Systems , 2014, OSDI.
[55] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.