IDS rule management made easy
暂无分享,去创建一个
[1] François Gagnon,et al. Automatic Evaluation of Intrusion Detection Systems , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[2] Stefan Lindskog,et al. Multipath TCP IDS Evasion and Mitigation , 2015, ISC.
[3] Ulf Lindqvist,et al. Detection, correlation, and visualization of attacks against critical infrastructure systems , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[4] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[5] Giovanni Vigna,et al. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[6] Stefan Lindskog,et al. Automated testing of IDS rules , 2015, 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW).
[7] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[8] Samuel Patton,et al. An Achilles Heel in Signature-Based IDS : Squealing False Positives in SNORT , 2001 .
[9] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[10] T.R. Henderson,et al. CORE: A real-time network emulator , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.