Next: About this document ...
Up: Intrusion Detection 101
Previous: Conclusions
- SK98
- B. Schneier, J. Kelsey, ``Cryptographic Support for Secure Logs on Untrusted
Machines,'' Proc. 7th USENIX Security Symposium, January 1998.
- CIDF98
- S. Staniford-Chen, B. Tung, D. Schnackenberg, ``The Common Intrusion Detection
Framework (CIDF),'' Information Survivability Workshop, Orlando, October 1998.
- PN98
- T. Ptacek and T. Newsham, "Insertion, Evasion, and Denial of Service:
Eluding Network Intrusion Detection,", Secure Networks, Inc., January
1998.
- Ches92
- B. Cheswick, ``An Evening with Berferd In Which a Cracker is Lured, Endured,
and Studied,'' Proc. Winter USENIX, San Francisco, 1992.
- Pax98
- V. Paxson, ``Bro: A System for Detecting Network Intruders in Real-Time,''
USENIX Security Symposium, 1998.
- Pax99
- V. Paxson, ``Defending Against Network IDS Evasion,'' 2nd International Workshop
on Recent Advances in Intrusion Detection, September 1999.
- Bass99
- T. Bass, ``Multisensor Data Fusion for Next Generation Distributed Intrusion
Detection Systems,'' Proc. Nat'l Symposium on Sensor and Data Fusion, Johns
Hopkins University, Applied Physics Laboratory, May 1999
- IDEF99
- M. Wood, ``Intrusion Detection Exchange Format Requirements,'' IETF Intrusion
Detection Working Group Internet Draft, June 1999.
- RS98
- J. Riordan, B. Scheier, ``Environmental Key Generation towards Clueless Agents,''
Mobile Agents and Security, G. Vigna, ed., Springer-Verlag, 1998, pp. 15-24.
- Axel99
- S. Axelsson, ``On a Difficulty of Intrusion Detection,'' 2nd International
Workshop on Recent Advances in Intrusion Detection, September 1999.
- DS99
- D. Song, G. Shaffer, M. Undy, ``Nidsbench - A Network Intrusion Detection System
Test Suite,'' 2nd International Workshop on Recent Advances in Intrusion Detection,
September 1999.
- GSS99
- A. Ghosh, A. Schwartzbard, M. Schatz, ``Learning Program Behavior Profiles
for Intrusion Detection,'' USENIX Workshop on Intrusion Detection and Network
Monitoring, April 1999.
- AAFID98
- J. Balasubramaniyan, J. Garcia-Fernandez, E. H. Spafford, and D. Zamboni, ``An
Architecture for Intrusion Detection using Autonomous Agents,'' Department
of Computer Sciences, Purdue University; Coast TR 98-05; 1998.
- HFD98
- S. A. Hofmeyr, S. Forrest, and P. D'haeseleer, ``An Immunological Approach
to Distributed Network Intrusion Detection,'' 1st International Workshop on
the Recent Advances in Intrusion Detection, September 1998.
- LJ97
- U. Lindqvist and E. Jonsson, ``How to Systematically Classify Computer Security
Intrusions,'' Proceedings of the 1997 IEEE Symposium on Security & Privacy,
pages 154-163, Oakland, California, May 4-7, 1997, IEEE Computer Society Press.
- DPEM97
- C. Ko, M. Ruschitzka, and K. Levitt, ``Execution Monitoring of
Security-critical Programs in Distributed Systems: A Specification-based
Approach," Proceedings of the 1997 IEEE Symposium on Security and
Privacy, pp. 134-144.
- Max98
- R. Maxion, ``Measuring Intrusion Detection Systems,'' 1st International Workshop
on Recent Advances in Intrusion Detection, September 1998.
Dug Song
1999-09-17