|
��[Axel00] Stefan Axelsson, Intrusion Detection Systems - A Survey and Taxonomy, Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, Mar. 2000 ��[Allen99] Allen, Julia, et al. State of the Practice of Intrusion Detection Technologies. (CMU/SEI-99/TR-028). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999. ��[Apap02] F. Apap, A. Honig, S. Hershkop, E. Eskin & S. Stolfo, Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses, In Proc. Fifth Intl. Symp. Recent Advances in Intrusion Detection (RAID), 2002. ��[Bowen99] Bowen, T., Segal, M., and Sekar, R. On Preventing Intrusions by Process Behavior Monitoring. In: Eighth USENIX Security Symposium (Washington, D.C., Aug 1999). ��[Cunn01] Cunningham, R. K., Lippmann, R. P. and Webster, S. E. Detecting and Displaying Novel Computer Attacks with Microscope, IEEE Trans. on Systems, Man, and Cybernetics Part A, 31, pp. 275-281, July 2001. ��[Chin03] R. Chinchani, S. Upadhyaya & K. Kwiat. A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. IEEE International Workshop on Information Assurance, Darmstadt, Germany, March 2003. ��[Lee99] W. Lee, S Stolfo, and K. Mok. Mining in a Data-flow Environment: Experience in Network Intrusion Detection. In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD ‘99), San Diego, CA, August 1999. ��[Eski00] E. Eskin. Anomaly Detection over Noisy Data using Learned Probability Distributions, Intl. Conf. Machine Learning, 2000. ��[Eskin01] Eleazar Eskin, Wenke Lee and Salvatore J. Stolfo. Modeling System Calls for Intrusion Detection with Dynamic Window Sizes. In Proceedings of DARPA Information Survivabilty Conference and Exposition II (DISCEX II). Anaheim, CA: June 12-14 2001. ��[Feng03] H. Feng, O. Kolesnikov, P. Fogla, W. Lee & W. Gong, Anomaly Detection Using Call Stack Information, IEEE S&P, 2003. ��[Forr98] S. Forrest, S. A. Hofmeyr, A. Intrusion Detection using Sequences of System Calls, Somayaji, in Journal of Computer Security, vol. 6, pp 151-180, 1998. ��[Krue03] C. Kruegel, D. Mutz, F. Valeur & G. Vigna, On the Detection of Anomalous System Call Arguments, 8th European Symposium on Research in Computer Security (ESORICS), 2003 ��[Sekar01] R. Sekar , M. Bendre , D. Dhurjati , P. Bollineni, A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. Proceedings of the IEEE Symposium on Security and Privacy, p.144, May 14-16, 2001 ��[Ghosh00] Ghosh, A. Schwartzbard, A., Schatz, M. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, p.93-109, October 02-04, 2000 ��[Gosh98] A. K. Gosh , J. Wanken , F. Charron. Detecting Anomalous and Unknown Intrusions Against Programs, Proceedings of the 14th Annual Computer Security Applications Conference, p.259, December 07-11, 1998 ��[Warr99] C. Warrender, S. Forrest and B. Pearlmutter, Detecting Intrusions Using System Calls : Alternative Data Models, IEEE Oakland '99 ��[Lane97] Lane, T. and Brodley, C. 1997. An Application of Machine Learning to Anomaly Detection, In Proceedings of the 20th National Information Systems Security Conference. 366--377.
|