|
[01] Symantac corp. “Symantac Government Internet Security Threat Report,” Trends for January-June 07, vol XII, Published September 2007. [02] C. Dowell and P. Ramstedt, “The COMPUTERWATCH data reduction tool” in Proc. 13th National Computer Security Conf., Washington, DC, Oct. 1990, pp. 99-108. [03] W. T. Tener, “Discovery: an expert system in the commercial data security environment,” in Proc. Fourth IFIP TCII International Conf. on Computer Security, Noth-holland, Dec. 1986. [04] S. E. Smaha, “Haystack: An intrusion detection system,” in proc. IEEE Fourth Aerospace Computer Security Applications, Orlando, FL, Dec. 1988. [05] T. F. Lunt et al., “IDES: A progress report,” in Proc. Sixth Aunnal Computer Security Applications Conf., Tucson, AZ, Dec. 1990. [06] H. S. Javitz and A. Valdez, “The SRI IDES statistical anomaly detection, ” in Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1991. [07] M. M. Sebring et al., “Expert system in intrusion detection: A case study,” in Proc. 11th National Computer Security Conf., Baltimore, MD, Oct. 1988. [08] D. E. Denning, “An intrusion detection model,” IEEE Trans. Software Engineer, vol. SE-13, no. 2, Feb 1987. [09] http://www.SNORT .org [10] H. S. Javitz and A. Valdes, “The NIDES statistical component: description and justification,” Technical Report, Computer Science Laboratory, SRI International, 1993. [11] L. T. Heberlein et al., “A network security monitor,” in Proc. Symposium on Research in Security and Privacy, Oakland, CA, May 1990, pp. 296-304. [12] S. R. Snapp et al., “DIDS(Distributed Intrusion Detection System) – motivation, architecture, and an early prototype,” in Proc. 14th national Computer Security Conf., Washington, D.C., Oct. 1991. [13] J. Marcus, K. Landfield, M. Stolarchuk, M. Sienkiewicz, A. Lambeth, and E. Wall, “Implementing a generalized tool for network monitoring,” http://www.nfr.com/forum/publications/LISA-97.html, 1999. [14] S. C. Lee and D. V. Heinbuch, “Training a neural-network based intrusion detector to recognized novel intrusions,” IEEE Trans. Systems, Man, and Cybernetics – Part A: Systems and Humand, vol. 31, no. 4, pp., July 2001. [15] Lippmann, P. Richard, and “Using key-string selection and neural networks to reduce false alarms and detect new intrusions with Sniffer-based intrusion detection system,” in Proc. RAID Conf., Nov. 1999, pp. 429-433. [16] W. Lee and S. J. Stolfo, “Data mining approached for intrusion detection,” inProc. 1998 USENIX Security Symposium, 1998. [17] Y. T. Lin, S. S. Tseng, and S. C. Lin, “An Intrusion detection model based upon intrusion detection markup language(IDML),” Journal of Information Science and Engineering, vol. 17, no. 6, pp. 899-919, 2001. [18] Y. T. Lin, S. S. Tseng, and S. J. Lin, “Intrusion detection markup language(IDML) and IDML based intrusion detection model,” in Proc. 5th World Multiconf. On Systemics, Cybernetics and Informatics, SCI 2001, Orlando, USA, 2001. [19] R. S. Boyer and J. S. Moore, “A fast string searching algorithm,” Commun. Of ACM, vol. 20, no. 10, pp.762-772, Oct. 1977. [20] D. E. Knuth, J. H. Morris, and V. R. Pratt, “Fast pattern matching in strings,” TR CS-74-440, Standford University, Stanford, California, 1974. [21] V. Aho and M. J. Corasic, “Efficient string matching: an aid to bibliographic search,” Commun. Of ACM, vol. 18, no. 8, pp. 333-340, June 1975. [22] E. P. Marktos, S. Antonatos, M. Polychronakis, and K. G. Anagnoatakis, “ExB: Exculsion-based signature matching for intrusion detection,” in Proc. International Conf. Commun. And Computer Network. IASTED, Combridge, USA, Nov. 2002, pp. 146-152. [23] K. G. Anagnostakis, E. P. Markatos, S. Antonatos, and M. Polychronakis, “E2xB: A domainspecific string matching algorithm for intrusion detection,” in Proc. 18th IFIP International Information Security Conf. (SEC2003), May 2003. [24] S. Wu and U. Manber, “A fast algorithm for multi-pattern searching,” Tech. Report TR94-17, Dept. of Computer Science, Univ. of Arizona, May 1994. [25] M. Necker, D. Contis, and D. Schimmel, “TCP-Stream reassembly and state tracking in hardware,” in proc. IEEE Field-Programmable Custom Computing Machines Symposium, April 2002, pp. 22-24.
|