Malicious- and Accidental-Fault Tolerance for Internet Applications Design of an Intrusion-Tolerant Intrusion Detection System

[1]  Sean Rooney,et al.  Remote Code Browsing, a Network Based Computation Utility , 2002, DSOM.

[2]  Klaus Julisch,et al.  Using root cause analysis to handle intrusion detection alarms , 2003 .

[3]  Hervé Debar,et al.  Building an Intrusion-Detection System to Detect Suspicious Process Behavior , 1999, Recent Advances in Intrusion Detection.

[4]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[5]  Hervé Debar,et al.  Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.

[6]  Lisa Talbot,et al.  Data Mining for Improving Intrusion Detection , 2000 .

[7]  Salvatore J. Stolfo,et al.  A coding approach to event correlation , 1995, Integrated Network Management.

[8]  Klaus Julisch,et al.  Mining alarm clusters to improve alarm handling efficiency , 2001, Seventeenth Annual Computer Security Applications Conference.

[9]  Dimitrios Gunopulos,et al.  Automatic subspace clustering of high dimensional data for data mining applications , 1998, SIGMOD '98.

[10]  Jiawei Han,et al.  Knowledge Discovery in Databases: An Attribute-Oriented Approach , 1992, VLDB.

[11]  Hermann Kopetz,et al.  Fault tolerance, principles and practice , 1990 .

[12]  Hermann Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992 .

[13]  Stuart Staniford-Chen,et al.  Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..

[14]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[15]  Jesse C. Rabek,et al.  LARIAT: Lincoln adaptable real-time information assurance testbed , 2002, Proceedings, IEEE Aerospace Conference.

[16]  John Mhugh The 1998 Lincoln Laboratory IDS evaluation : A critique , 2000 .

[17]  Stefanos Manganaris,et al.  A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.

[18]  Jon M. Kleinberg,et al.  Clustering categorical data: an approach based on dynamical systems , 2000, The VLDB Journal.

[19]  Sushil Jajodia,et al.  Abstraction-based intrusion detection in distributed environments , 2001, TSEC.

[20]  Ron Shamir,et al.  Clustering Gene Expression Patterns , 1999, J. Comput. Biol..

[21]  R. Sekar,et al.  A high-performance network intrusion detection system , 1999, CCS '99.

[22]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[23]  M. Paradies,et al.  Root cause analysis at Savannah River plant (nuclear power station) , 1988, Conference Record for 1988 IEEE Fourth Conference on Human Factors and Power Plants,.

[24]  Miguel Correia,et al.  First Specification of APIs and Protocols for the MAFTIA Middleware , 2001 .

[25]  Marc Dacier,et al.  A Lightweight Tool for Detecting Web Server Attacks , 2000, NDSS.

[26]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[27]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[28]  Sandeep Kumar,et al.  Classification and detection of computer intrusions , 1996 .

[29]  Stefan Axelsson,et al.  The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.

[30]  Andrew Stewart Distributed Metastasis : A Computer Network Penetration Methodology , 1999 .

[31]  Yiming Yang,et al.  A Comparative Study on Feature Selection in Text Categorization , 1997, ICML.

[32]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[33]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[34]  Huan Liu,et al.  A Probabilistic Approach to Feature Selection - A Filter Solution , 1996, ICML.

[35]  Steven M. Bellovin,et al.  Packets found on an internet , 1993, CCRV.

[36]  Lee M. Rossey,et al.  Extending the DARPA off-line intrusion detection evaluations , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[37]  Frédéric Cuppens,et al.  Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.

[38]  Daphne Koller,et al.  Toward Optimal Feature Selection , 1996, ICML.

[39]  Chris Clifton,et al.  Developing custom intrusion detection filters using data mining , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[40]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[41]  Victor Shoup,et al.  Secure and Efficient Asynchronous Broadcast Protocols , 2001, CRYPTO.

[42]  Richard Lippmann,et al.  Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.

[43]  Eugene H. Spafford,et al.  Using internal sensors for computer intrusion detection , 2001 .

[44]  Koral Ilgun,et al.  USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[45]  Salvatore J. Stolfo,et al.  Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection , 1998, KDD.

[46]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[47]  Jiawei Han,et al.  Data-Driven Discovery of Quantitative Rules in Relational Databases , 1993, IEEE Trans. Knowl. Data Eng..

[48]  Marc Dacier,et al.  Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.

[49]  Anil K. Jain,et al.  Algorithms for Clustering Data , 1988 .

[50]  Sushil Jajodia,et al.  Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.

[51]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[52]  Johannes Gehrke,et al.  CACTUS—clustering categorical data using summaries , 1999, KDD '99.

[53]  Aris Floratos,et al.  Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm [published erratum appears in Bioinformatics 1998;14(2): 229] , 1998, Bioinform..

[54]  Marc Dacier,et al.  A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.

[55]  Joseph L. Hellerstein,et al.  Mining Event Data for Actionable Patterns , 2000, Int. CMG Conference.

[56]  Frédéric Cuppens,et al.  Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[57]  Sudipto Guha,et al.  ROCK: A Robust Clustering Algorithm for Categorical Attributes , 2000, Inf. Syst..