Experiences with Specification-Based Intrusion Detection

作者: Prem Uppuluri , R. Sekar

DOI: 10.1007/3-540-45474-8_11

关键词:

摘要: … Central to our approach is the observation that intrusions manifest observable events that … event-based intrusion detection by developing a domain-specific language called behavioral …

参考文章(9)
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)
R. Sekar, P. Uppuluri, Synthesizing fast intrusion prevention/detection systems from high-level specifications usenix security symposium. pp. 6- 6 ,(1999)
Aaron Schwartzbard, Michael Schatz, Anup K. Ghosh, Learning program behavior profiles for intrusion detection ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 6- 6 ,(1999)
Richard Lippmann, Joshua W Haines, David J Fried, Jonathan Korba, Kumar Das, The 1999 DARPA off-line intrusion detection evaluation recent advances in intrusion detection. ,vol. 34, pp. 579- 595 ,(2000) , 10.1016/S1389-1286(00)00139-0
Fred B. Schneider, Enforceable security policies ACM Transactions on Information and System Security. ,vol. 3, pp. 30- 50 ,(2000) , 10.1145/353323.353382
R. Sekar, Y. Guang, S. Verma, T. Shanbhag, A high-performance network intrusion detection system computer and communications security. pp. 8- 17 ,(1999) , 10.1145/319709.319712
P.A. Porras, R.A. Kemmerer, Penetration state transition analysis: A rule-based intrusion detection approach annual computer security applications conference. pp. 220- 229 ,(1992) , 10.1109/CSAC.1992.228217
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Computer immunology Communications of The ACM. ,vol. 40, pp. 88- 96 ,(1997) , 10.1145/262793.262811
T. Fraser, L. Badger, M. Feldman, Hardening COTS software with generic software wrappers ieee symposium on security and privacy. pp. 2- 16 ,(1999) , 10.1109/SECPRI.1999.766713