Intrusion detection using autonomous agents

[1]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[2]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[3]  Biswanath Mukherjee,et al.  Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[4]  David Futato Perl module reference , 1998 .

[5]  DetectionThomas H. Ptacektqbf,et al.  Insertion , Evasion , andDenial of Service : Eluding Network Intrusion , 1998 .

[6]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[7]  Biswanath Mukherjee,et al.  DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .

[8]  Jeffrey M. Bradshaw,et al.  An introduction to software agents , 1997 .

[9]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[10]  Sandeep Kumar,et al.  Classification and detection of computer intrusions , 1996 .

[11]  Udo W. Pooch,et al.  Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..

[12]  Eugene H. Spafford,et al.  IDIOT - Users Guide , 1996 .

[13]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[14]  Karl N. Levitt,et al.  GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .

[15]  Eugene H. Spafford,et al.  Active Defense of a Computer System using Autonomous Agents , 1995 .

[16]  Eugene H. Spafford,et al.  Defending a Computer System Using Autonomous Agents , 1995 .

[17]  Eugene H. Spafford,et al.  The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.

[18]  Michael R. Genesereth,et al.  Software agents , 1994, CACM.

[19]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[20]  J. F. McClary,et al.  NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..

[21]  Steven R. Snapp,et al.  The DIDS (Distributed Intrusion Detection System) Prototype , 1992, USENIX Summer.

[22]  T. Lunt A Real-Time Intrusion Detection Expert System (IDES)-Final Report , 1992 .

[23]  Arthur B. Maccabe,et al.  The architecture of a network level intrusion detection system , 1990 .

[24]  Biswanath Mukherjee,et al.  A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[25]  Intrusion Detection Systems and A View To Its Forensic Applications , .