Consolidation and Evaluation of IDS Taxonomies
暂无分享,去创建一个
[1] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[2] Harold Joseph Highland,et al. AIN'T misbehaving—A taxonomy of anti-intrusion techniques , 1995 .
[3] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[4] Robert K. Cunningham,et al. Detecting and displaying novel computer attacks with Macroscope , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[5] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Marc Dacier,et al. A Lightweight Tool for Detecting Web Server Attacks , 2000, NDSS.
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[8] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[9] Ulf Lindqvist,et al. On the Fundamentals of Analysis and Detection of Computer Misuse , 1999 .
[10] Håkan Kvarnström,et al. A survey of commercial tools for intrusion detection , 1999 .
[11] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[12] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[13] Kathleen A. Jackson. INTRUSION DETECTION SYSTEM (IDS) PRODUCT SURVEY , 1999 .
[14] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[15] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[16] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[17] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[18] Peter M. Mell. Understanding the Global Attack Toolkit Using a Database of Dependent Classifiers | NIST , 1998 .
[19] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[20] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[21] Dominique Alessandri,et al. Towards a Taxonomy of Intrusion Detection Systems and Attacks , 2001 .
[22] Ulf Lindqvist,et al. eXpert-BSM: a host-based intrusion detection solution for Sun Solaris , 2001, Seventeenth Annual Computer Security Applications Conference.
[23] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[24] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[25] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.