[19] T. Lane and C.E. Brodley. Temporal sequence learning
and data reduction for anomaly detection. In
Proceedings of the 5th ACM conference on Computer
and communications security, pages 150–158. ACM
Press, 1998.
[20] W. Lee and S. Stolfo. A Framework for Constructing
Features and Models for Intrusion Detection Systems.
ACM Transactions on Information and System
Security, 3(4), November 2000.
[21] W. Lee, S. Stolfo, and K. Mok. Mining in a Data-flow
Environment: Experience in Network Intrusion
Detection. In Proceedings of the 5th ACM SIGKDD
International Conference on Knowledge Discovery &
Data Mining (KDD ’99), San Diego, CA, August 1999.
[22] J. Liberty and D. Hurwitz. Programming ASP.NET.
O’REILLY, February 2002.
[23] U. Lindqvist and P.A. Porras. Detecting Computer and
Network Misuse with the Production-Based Expert
System Toolset (P-BEST). In IEEE Symposium on
Security and Privacy, pages 146–161, Oakland,
California, May 1999.
[24] Miva HtmlScript. http://www.htmlscript.com/.
[25] V. Paxson. Bro: A System for Detecting Network
Intruders in Real-Time. In Proceedings of the 7th
USENIX Security Symposium, San Antonio, TX,
January 1998.
[26] Phorum: PHP Message Board.
http://www.phorum.org/.
[27] PHP Advisory Homepage.
http://www.phpadvisory.com/, 2002.
[28] M. Roesch. Snort - Lightweight Intrusion Detection for
Networks. In Proceedings of the USENIX LISA ’99
Conference, November 1999.
[29] Security Focus Homepage.
http://www.securityfocus.com/, 2002.
[30] Andreas Stolcke and Stephen Omohundro. Hidden
Markov Model Induction by Bayesian Model Merging.
Advances in Neural Information Processing Systems,
1993.
[31] Andreas Stolcke and Stephen Omohundro. Inducing
Probabilistic Grammars by Bayesian Model Merging.
In Conference on Grammatical Inference, 1994.
[32] K. Tan and R. Maxion. ”Why 6?” Defining the
Operational Limits of Stide, an Anomaly-Based
Intrusion Detector. In Proceedings of the IEEE
Symposium on Security and Privacy, pages 188–202,
Oakland, CA, May 2002.
[33] Robert Tarjan. Depth-First Search and Linear Graph
Algorithms. SIAM Journal of Computing, 1(2):10–20,
June 1972.
[34] Security Tracker. Vulnerability statistics April
2001-march 2002. http://www.securitytracker.com/
learn/statistics.html, April 2002.
[35] N. Ye, Y. Zhang, and C. M. Borror. Robustness of the
Markov chain model for cyber attack detection. IEEE
and data reduction for anomaly detection. In
Proceedings of the 5th ACM conference on Computer
and communications security, pages 150–158. ACM
Press, 1998.
[20] W. Lee and S. Stolfo. A Framework for Constructing
Features and Models for Intrusion Detection Systems.
ACM Transactions on Information and System
Security, 3(4), November 2000.
[21] W. Lee, S. Stolfo, and K. Mok. Mining in a Data-flow
Environment: Experience in Network Intrusion
Detection. In Proceedings of the 5th ACM SIGKDD
International Conference on Knowledge Discovery &
Data Mining (KDD ’99), San Diego, CA, August 1999.
[22] J. Liberty and D. Hurwitz. Programming ASP.NET.
O’REILLY, February 2002.
[23] U. Lindqvist and P.A. Porras. Detecting Computer and
Network Misuse with the Production-Based Expert
System Toolset (P-BEST). In IEEE Symposium on
Security and Privacy, pages 146–161, Oakland,
California, May 1999.
[24] Miva HtmlScript. http://www.htmlscript.com/.
[25] V. Paxson. Bro: A System for Detecting Network
Intruders in Real-Time. In Proceedings of the 7th
USENIX Security Symposium, San Antonio, TX,
January 1998.
[26] Phorum: PHP Message Board.
http://www.phorum.org/.
[27] PHP Advisory Homepage.
http://www.phpadvisory.com/, 2002.
[28] M. Roesch. Snort - Lightweight Intrusion Detection for
Networks. In Proceedings of the USENIX LISA ’99
Conference, November 1999.
[29] Security Focus Homepage.
http://www.securityfocus.com/, 2002.
[30] Andreas Stolcke and Stephen Omohundro. Hidden
Markov Model Induction by Bayesian Model Merging.
Advances in Neural Information Processing Systems,
1993.
[31] Andreas Stolcke and Stephen Omohundro. Inducing
Probabilistic Grammars by Bayesian Model Merging.
In Conference on Grammatical Inference, 1994.
[32] K. Tan and R. Maxion. ”Why 6?” Defining the
Operational Limits of Stide, an Anomaly-Based
Intrusion Detector. In Proceedings of the IEEE
Symposium on Security and Privacy, pages 188–202,
Oakland, CA, May 2002.
[33] Robert Tarjan. Depth-First Search and Linear Graph
Algorithms. SIAM Journal of Computing, 1(2):10–20,
June 1972.
[34] Security Tracker. Vulnerability statistics April
2001-march 2002. http://www.securitytracker.com/
learn/statistics.html, April 2002.
[35] N. Ye, Y. Zhang, and C. M. Borror. Robustness of the
Markov chain model for cyber attack detection. IEEE
No comments:
Post a Comment