|
[1] R. Heady, G. Luger, A. Maccabe, M. Servilla, “The Architecture of A Network Level Intrusion Detection System”, Technical Report CS-90-20, Dept. of Computer Science, University of New Mexico, August 1990. [2] S. Axelsson, “Research in Intrusion-detection Systems: A Survey”, Technical Report 98─17, Dept. of Computer Engineering, Chalmers University of Technology, December 1998. [3] R. Barber, “The Evolution of Intrusion Detection Systems - The Next Step”, Computers & Security, Volume 20 Issue 2, pp.132-145, April 2001. [4] eEye Digital Security, “.ida Code Red Worm”, http://www.eeye.com/html/Research/Advisories/AL20010717.html, July 2001. [5] Fyodor, “Remote OS Detection via TCP/IP Stack Fingerprinting”, http://www.insecure.org/nmap/nmap-fingerprinting-article.html”, April 1999. [6] M. de Vivo, E. Carrasco, G. Iserm, and G. O. de Vivo, “A Review of Port Scanning Techniques”, Computer Communication Review, Volume 29, No. 2, April 1999. [7] M. Smart, G. Robert Malan, and F. Jahanian, “Defeating TCP/IP Stack Fingerprinting”, Proceedings of the 9th USENIX Security Symposium, August 2000. [8] D. B. Chapman and E. D. Zwicky, “Building Internet Firewalls”, pp. 17, O’Reilly & Associates, Inc. 1995. [9] M. de Vivo, G. O. de Vivo, R. Koeneke and G. Isern, “Internet Vulnerabilities Related to TCP/IP and T/TCP”, ACM SIGCOMM Computer Communication Review, Volume 29, No. 1, pp.81-85, January 1999. [10] R., “FAQ: Network Intrusion Detection Systems”, http://www.robertgraham.com/pubs/network-intrusion-detection.txt, 1999. [11] Snort, http://www.snort.org [12] Libpcap, http://www.tcpdump.org [13] D. Curry and H. Debar, “Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition”, IETF IDWG Internet Draft, http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-06.txt, December 2001. [14] V. Paxson, “Bro: A System for Detecting Network Intruders in Real-Time”, Computer Networks, 31(23-24), pp. 2435-2463, December 1999. [15] G. R. Malan, D. Watson, F. Jahanian and P. Howell,“Transport and Application Protocol Scrubbing”, Proceedings of the IEEE INFOCOM 2000 Conference, Tel Aviv, Israel, March 2000. [16] Hogwash, http://hogwash.sourceforge.net/ [17] Libnet — Packet Assembly System, http://www.packetfactory.net/Projects/Libnet/. [18] M. Fisk, G. Varghese, “Fast Content-Based Packet Handling for Intrusion Detection,” UCSD Technical Report CS2001-0670, University of California San Diego, May 2001. [19] NetFilter, http://netfilter.samba.org/ [20] MITRE, “CVE-2000-0884,” http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884 [21] arachNIDS, “IDS297/WEB-MISC_HTTP-DIRECTORY-TRAVERSAL1,” http://www.whitehats.com/IDS/297 [22] arachNIDS, “IDS298/WEB-MISC_HTTP-DIRECTORY-TRAVERSAL2,” http://www.whitehats.com/IDS/298 [23] B. Cheswick, “An Eventing with Berford in Which a Cracker is Lured, Endured, and Studied,” Firewall and Internet Security, Chapter 10, Addison-Wesley, 1994. [24] D.Klug, Honey Pots and Intrusion Detection, SANS Institute, September 2001. [25] The Honeynet Project, Know Your Ememy: Honeynets, http://www.honeynet.org/papers/, April 2000.
|