STATL: An Attack Language for State-Based Intrusion Detection
暂无分享,去创建一个
Giovanni Vigna | Richard A. Kemmerer | Steve T. Eckmann | R. Kemmerer | S. T. Eckmann | G. Vigna | Steven T. Eckmann
[1] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[2] David A. Curry,et al. Intrusion detection message exchange format: Extensible markup language (xml) document type de nitio , 2001 .
[3] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[4] R. Sekar,et al. Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications , 1999, USENIX Security Symposium.
[5] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[6] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[7] Marcus J. Ranum,et al. Implementing a generalized tool for network monitoring , 1997, Inf. Secur. Tech. Rep..
[8] Alfonso Valdes,et al. An Approach to Sensor Correlation , 2000 .
[9] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[10] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[11] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[12] C. M. Sperberg-McQueen,et al. Extensible Markup Language (XML) , 1997, World Wide Web J..
[13] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[14] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[15] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[16] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[17] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[18] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[19] R. Sekar,et al. A high-performance network intrusion detection system , 1999, CCS '99.
[20] Matt Bishop,et al. A standard audit trail format , 1995 .
[21] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.