Automatic generation and analysis of NIDS attacks
暂无分享,去创建一个
[1] Vern Paxson,et al. Enhancing byte-level network intrusion detection signatures with context , 2003, CCS '03.
[2] Somesh Jha,et al. Attack Generation for NIDS Testing Using Natural Deduction , 2004 .
[3] Kymie M. C. Tan,et al. Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits , 2002, RAID.
[4] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[5] Jonathan B. Postel,et al. RFC 959: File transfer protocol , 1985 .
[6] Lawrence C. Paulson. Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys , 1997 .
[7] Yi Zhang,et al. Performance Adaptation in Real-Time Intrusion Detection Systems , 2002, RAID.
[8] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[9] Glenford J. Myers,et al. Art of Software Testing , 1979 .
[10] Divesh Srivastava,et al. Efficient Bottom-Up Evaluation of Logic Programs , 1992 .
[11] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[12] Andrew R. Baker,et al. Snort 2.1 intrusion detection , 2004 .
[13] Christopher Krügel,et al. Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] P. Dewilde,et al. Computer systems and software engineering : state-of-the-art , 1992 .
[15] Jeffrey Posluns,et al. Snort 2.0 Intrusion Detection , 2003 .
[16] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[17] Catherine A. Meadows. A model of computation for the NRL Protocol Analyzer , 1994, Proceedings The Computer Security Foundations Workshop VII.
[18] Leon Sterling,et al. The Art of Prolog , 1987, IEEE Expert.
[19] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[20] Vern Paxson,et al. Active mapping: resisting NIDS evasion without altering traffic , 2003, 2003 Symposium on Security and Privacy, 2003..
[21] John McHugh,et al. Hiding Intrusions: From the Abnormal to the Normal and Beyond , 2002, Information Hiding.
[22] Martin Roesch,et al. SNORT: The Open Source Network Intrusion Detection System 1 , 2002 .
[23] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[24] Suzanne W. Dietrich,et al. Extension Tables: Memo Relations in Logic Programming , 1987, SLP.
[25] Marc Dacier,et al. Design of an Intrusion-Tolerant Intrusion Detection System , 2002 .
[26] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[27] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[28] Giovanni Vigna,et al. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[29] Calcagnini Giovanni. Fun with Packets: Designing a Stick , 2002 .
[30] Hervé Debar,et al. Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems , 2002, RAID.
[31] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[32] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.
[33] D. Prawitz. Natural Deduction: A Proof-Theoretical Study , 1965 .
[34] Dominique Alessandri,et al. Towards a Taxonomy of Intrusion Detection Systems and Attacks , 2001 .
[35] Vitaly Shmatikov,et al. Efficient finite-state analysis for large security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).