Consolidation and Evaluation of IDS Taxonomies

A canless method for hot working a nickel-base gas atomized alloy powder. The powder is blended with nickel powder, consolidated and sintered to a sufficient green strength. The surface of the resultant form is sealed to create an oxygen impervious layer so as to prevent oxidation therein. The sealed surface, in a sense, acts as a can. The form is then reheated and hot worked.

[1]  Sandeep Kumar,et al.  Classification and detection of computer intrusions , 1996 .

[2]  Harold Joseph Highland,et al.  AIN'T misbehaving—A taxonomy of anti-intrusion techniques , 1995 .

[3]  Harold S. Javitz,et al.  The NIDES Statistical Component Description and Justification , 1994 .

[4]  Robert K. Cunningham,et al.  Detecting and displaying novel computer attacks with Macroscope , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[5]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  Marc Dacier,et al.  A Lightweight Tool for Detecting Web Server Attacks , 2000, NDSS.

[7]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[8]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[9]  Ulf Lindqvist,et al.  On the Fundamentals of Analysis and Detection of Computer Misuse , 1999 .

[10]  Håkan Kvarnström,et al.  A survey of commercial tools for intrusion detection , 1999 .

[11]  Richard Lippmann,et al.  The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.

[12]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[13]  Kathleen A. Jackson INTRUSION DETECTION SYSTEM (IDS) PRODUCT SURVEY , 1999 .

[14]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[15]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[16]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[17]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[18]  Peter M. Mell Understanding the Global Attack Toolkit Using a Database of Dependent Classifiers | NIST , 1998 .

[19]  Karl N. Levitt,et al.  Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[20]  Markus G. Kuhn,et al.  Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[21]  Dominique Alessandri,et al.  Towards a Taxonomy of Intrusion Detection Systems and Attacks , 2001 .

[22]  Ulf Lindqvist,et al.  eXpert-BSM: a host-based intrusion detection solution for Sun Solaris , 2001, Seventeenth Annual Computer Security Applications Conference.

[23]  Ulf Lindqvist,et al.  Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[24]  Eugene H. Spafford,et al.  Software vulnerability analysis , 1998 .

[25]  Alfonso Valdes,et al.  Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.