Intrusion detection: methods and systems. Part II

This paper is part II of a previous article of the same title: Intrusion detection. Part II is concerned with intrusion threats, attacks, defense, models, methods and systems.

[1]  Matt Bishop A model of security monitoring , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.

[2]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[3]  Philip K. Chan,et al.  Detecting novel attacks by identifying anomalous network packet headers , 2001 .

[4]  Nathalie Weiler,et al.  Honeypots for distributed denial-of-service attacks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[5]  Eleazar Eskin,et al.  A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .

[6]  Jeannette M. Wing Vulnerability Analysis of Networked Systems , 2002, WETICE.

[7]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Rebecca Gurley Bace,et al.  Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[9]  Kathleen A. Jackson INTRUSION DETECTION SYSTEM (IDS) PRODUCT SURVEY , 1999 .

[10]  Aurobindo Sundaram,et al.  An introduction to intrusion detection , 1996, CROS.

[11]  Victor K.-W. Wei,et al.  Preemptive distributed intrusion detection using mobile agents , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[12]  Salvatore J. Stolfo,et al.  Adaptive Model Generation for Intrusion Detection Systems , 2000 .

[13]  Peter G. Neumann,et al.  Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.

[14]  Alfonso Valdes,et al.  Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .

[15]  Stephen Northcutt,et al.  Network Intrusion Detection: An Analyst's Hand-book , 1999 .

[16]  Eleazar Eskin,et al.  Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.

[17]  Andrew Harrison Gross,et al.  Analyzing computer intrusions , 1998 .

[18]  E. Amoroso Intrusion Detection , 1999 .

[19]  K. A. Jackson,et al.  An expert system application for network intrusion detection , 1991 .

[20]  K. A. Jackson,et al.  An automated computer misuse detection system for UNICOS , 1994 .

[21]  Erland Jonsson,et al.  How to systematically classify computer security intrusions , 1997, S&P 1997.

[22]  K. A. Jackson,et al.  A phased approach to network intrusion detection , 1991 .

[23]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.