next up previous
Next: About this document ... Up: Intrusion Detection 101 Previous: Conclusions

Bibliography

SK98
B. Schneier, J. Kelsey, ``Cryptographic Support for Secure Logs on Untrusted Machines,'' Proc. 7th USENIX Security Symposium, January 1998.

CIDF98
S. Staniford-Chen, B. Tung, D. Schnackenberg, ``The Common Intrusion Detection Framework (CIDF),'' Information Survivability Workshop, Orlando, October 1998.

PN98
T. Ptacek and T. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection,", Secure Networks, Inc., January 1998.

Ches92
B. Cheswick, ``An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied,'' Proc. Winter USENIX, San Francisco, 1992.

Pax98
V. Paxson, ``Bro: A System for Detecting Network Intruders in Real-Time,'' USENIX Security Symposium, 1998.

Pax99
V. Paxson, ``Defending Against Network IDS Evasion,'' 2nd International Workshop on Recent Advances in Intrusion Detection, September 1999.

Bass99
T. Bass, ``Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems,'' Proc. Nat'l Symposium on Sensor and Data Fusion, Johns Hopkins University, Applied Physics Laboratory, May 1999

IDEF99
M. Wood, ``Intrusion Detection Exchange Format Requirements,'' IETF Intrusion Detection Working Group Internet Draft, June 1999.

RS98
J. Riordan, B. Scheier, ``Environmental Key Generation towards Clueless Agents,'' Mobile Agents and Security, G. Vigna, ed., Springer-Verlag, 1998, pp. 15-24.

Axel99
S. Axelsson, ``On a Difficulty of Intrusion Detection,'' 2nd International Workshop on Recent Advances in Intrusion Detection, September 1999.

DS99
D. Song, G. Shaffer, M. Undy, ``Nidsbench - A Network Intrusion Detection System Test Suite,'' 2nd International Workshop on Recent Advances in Intrusion Detection, September 1999.

GSS99
A. Ghosh, A. Schwartzbard, M. Schatz, ``Learning Program Behavior Profiles for Intrusion Detection,'' USENIX Workshop on Intrusion Detection and Network Monitoring, April 1999.

AAFID98
J. Balasubramaniyan, J. Garcia-Fernandez, E. H. Spafford, and D. Zamboni, ``An Architecture for Intrusion Detection using Autonomous Agents,'' Department of Computer Sciences, Purdue University; Coast TR 98-05; 1998.

HFD98
S. A. Hofmeyr, S. Forrest, and P. D'haeseleer, ``An Immunological Approach to Distributed Network Intrusion Detection,'' 1st International Workshop on the Recent Advances in Intrusion Detection, September 1998.

LJ97
U. Lindqvist and E. Jonsson, ``How to Systematically Classify Computer Security Intrusions,'' Proceedings of the 1997 IEEE Symposium on Security & Privacy, pages 154-163, Oakland, California, May 4-7, 1997, IEEE Computer Society Press.

DPEM97
C. Ko, M. Ruschitzka, and K. Levitt, ``Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach," Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 134-144.

Max98
R. Maxion, ``Measuring Intrusion Detection Systems,'' 1st International Workshop on Recent Advances in Intrusion Detection, September 1998.


Dug Song
1999-09-17