|
[1] S. T. Eckmann, V. Giovanni, and R. A. Kemmerer. STATL: An attack language for state-based intrusion detection. In ACM Workshop on Intrusion Detection Systems, 2000. [2] Vigna, G., Eckmann, S. T., and Kemmerer, R. A. (2000a). Attack Languages. In Proceedings of the IEEE Information Survivability Workshop. [3] Secure Networks. Custom Attack Simulation language (CASL), January 1998. [4] Sandeep Kumar. Classification and Detection of Computer Intrusions. Ph.D. Dissertation, August 1995. [5] David A Curry, Herve Debar, Ming-Yuh Huang, “Intrusion Detection Message Exchange Format Extensible Markup Language (XML) Document Type Definition”, June 2001. [6] Document Object Model (DOM) Level 1 Specification, http://www.w3.org/TR/1998/REC-DOM-Level-1-19981001/ [7] Document Object Model (DOM) Level 1 Specification (Second Edition), http://www.w3.org/TR/2000/WD-DOM-Level-1-20000929/ [8] R. Deraison. The nessus attack scripting language reference guide. http://www.nessus.org. [9] Extensible Markup Language (XML) 1.0 (Second Edition), W3C Recommendation 6 October 2000. http://www.w3.org/TR/2000/REC-xml-20001006 [10] Guide to the W3C XML Specification ("XMLspec") DTD, Version 2.1 http://www.w3.org/XML/1998/06/xmlspec-report.htm [11] CERT/CC Statistics 1988-2002, http://www.cert.org/stats/ [12] The Twenty Most Critical Internet Security Vulnerability, http://www.sans.org/top20.htm [13] CERT http://www.cert.org/ [14] Internet Security Systems http://www.iss.net [15] X-Force http://xforce.iss.net [16] Security Focus http://www.securityfocus.com/ [17] Packet Storm http://packetstorm.dnsi.info/ [18] W.Richard Stevens, TCP/IP Illustrated, Volume 1, 1994. [19] Harold, Elliotte Rusty, XML Bible, IDG Books Worldwide,1999.
|