Application Level IDS using Protocol Analysis
暂无分享,去创建一个
V. Vaidehi | K.V. Rajkumar | S. Pradeep | N. Srinivasan | M. Vanishree | K. Rajkumar | V. Vaidehi | N. Srinivasan | S. Pradeep | M. Vanishree
[1] Renato De Mori,et al. The Application of Semantic Classification Trees to Natural Language Understanding , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Michaël Rusinowitch,et al. Protocol analysis in intrusion detection using decision tree , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[3] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[4] Jianping Wu,et al. Study on conformance testing of hypertext transfer protocol , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[7] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[8] Li Zhou,et al. Integrated access control and intrusion detection for Web Servers , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[9] Gerald A. Marin,et al. Modeling networking protocols to test intrusion detection systems , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[10] Giovanni Vigna,et al. A stateful intrusion detection system for World-Wide Web servers , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[11] Steven A. Hofmeyr,et al. Intrusion Detection via System Call Traces , 1997, IEEE Softw..
[12] Nen-Fu Huang,et al. A fast pattern-match engine for network processor-based network intrusion detection system , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[13] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[14] V. Vaidehi,et al. Context based Application Level Intrusion Detection System , 2006, International conference on Networking and Services (ICNS'06).
[15] Christopher Krügel,et al. Using Decision Trees to Improve Signature-Based Intrusion Detection , 2003, RAID.
[16] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[17] David Watson,et al. Transport and application protocol scrubbing , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[18] Daniel V. Klein. Defending Against the Wily Surfer-Web-based Attacks and Defenses , 1999, Workshop on Intrusion Detection and Network Monitoring.