Cisco Knowledge Suite Cisco SystemsCisco Press
   

   
Home
MyCKS
Cutting Edge
Certification
Core Reference
Guided Learning
   
Networking Architecture
LAN
WAN
Switching
Internet Protocols (IP)
Network Protocols
Transport and Application Protocols
Desktop Protocols
Security and Troubleshooting
Network Resources and Management
Integrated Services
 

Endnotes

   

< Back Contents Next >

Analysis Schemes

  

4.1. -

Thinking About Intrusions

  

4.2. -

A Model for Intrusion Analysis

  

4.3. -

Techniques

  

4.4. -

Conclusion

  

 

Endnotes

Save to MyCKS

 
Intrusion Detection

From: Intrusion Detection
Author: Rebecca Bace
Publisher: MTP
More Information

Endnotes

  1. Lunt, T., A. Tamaru, and F. Gilham. “IDES: A Progress Report.” Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, AZ, December 1990.

  2. Ranum, M. personal communication, June 1999.

  3. Kumar, S. “Classification and Detection of Computer Intrusions.” Ph.D. thesis, Department of Computer Sciences, Purdue University, 1995.

  4. Ilgun, K. “USTAT: A Real-Time Intrusion Detection System for UNIX.” Masterthesis, Computer Science Department, University of California, Santa Barbara, CA, November 1992.

  5. Porras, P. “STAT, A State Transition Analysis Tool for Intrusion Detection.” Master thesis, Computer Science Department, University of California, Santa Barbara, CA, July 1992.

  6. Kumar, S. and E. H. Spafford, “A Pattern Matching Model for Misuse Intrusion Detection.” Proceedings of the Seventeenth National Computer Security Conference, October 1994: 11-21.

  7. Mounji, A. “Languages and Tools for Rule-Based Distributed Intrusion Detection.” Thesis, Faculte's Universitaires Notre-Dame de la Paix Namur, Belgium, September 1997.

  8. Smaha, S. and S. Snapp. “Method and System for Detecting Intrusion intoand Misuse of a Data Processing System.” US555742, U.S. Patent Office,September 17, 1996.

  9. http://www.nai.com/asp_set/products/tns/ccmonitor_intro.asp.

  10. http://www.nfr.net.

  11. Anderson, R. and A. Khattak. “The Use of Information Retrieval Techniques for Intrusion Detection.” Presentation at the First International Workshop on the Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium, September 1998.

  12. Denning, D. “An Intrusion Detection Model.” Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986: 119-131.

  13. Hochberg, J., K. Jackson, C. Stallings, J. McClary, D. DuBois, and J. Ford. “NADIR: An Automated System for Detecting Network Intrusion and Misuse.” Computers and Security, vol. 12, Elsevier Science Publishers, Ltd., 1993: 235-248.

  14. Javitz, H. S. and A. Valdes. “The SRI IDES Statistical Anomaly Detector.” Proceedings IEEE Symposium on Security and Privacy, Oakland, CA, May 1991.

  15. Smaha, S. E. “Haystack: An Intrusion Detection System.” Proceedings of the Fourth IEEE Aerospace Computer Security Applications Conference, Orlando, FL,December 1988.

  16. Mukherjee, B., L. T. Heberlein, and K. N. Levitt. “Network Intrusion Detection.” IEEE Network, vol. 8, no. 3, May/June 1994: 26-41.

  17. Hochberg, J. et al., op cit.

  18. Lankewicz, L. and M. Benard. “Real Time Anomaly Detection Using a Nonparametric Pattern Recognition Approach.” Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, TX, December 1991.

  19. Liepins, G. E. and H. S. Vaccaro. “Intrusion Detection: Its Role and Validation.” Computers and Security, vol. 11, Elsevier Science Publishers, Ltd., 1992: 347-355.

  20. Teng, H. S., K. Chen, and S. Lu. “Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns.” Proceedings of the IEEE Symposium on Security and Privacy, May 1990.

  21. Debar, H., M. Becker, and D. Siboni. “A Neural Network Component for an Intrusion Detection System.” Proceedings of the 1992 IEEE Symposium on Security and Privacy: 240-250.

  22. Hofmeyr, S. A, S. Forrest, and A. Somayaji. “Intrusion Detection Using Sequencesof System Calls.” Journal of Computer Security, vol. 6, no. 3, 1996.

  23. Warrender, C., S. Forrest, and B. Pearlmutter. “Detecting Intrusions Using System Calls: Alternative Data Models.” Proceedings of the Twenty-Fifth IEEE Symposiumon Security and Privacy, Oakland, CA, May 1999.

  24. Howe, D. Free On-line Dictionary of Computing (FOLDOC), available at http://foldoc.doc.ic.ac.uk.

  25. Mé, L. “GASSATA, A Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis.” First International Workshop on the Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium, September 1998.

  26. Balasubramaniyan, J. S., J. O. Garcia-Fernandez, D. Isacoff, E. H. Spafford, andD. Zamboni. “An Architecture for Intrusion Detection Using Autonomous Agents.” COAST Technical Report 98/05, Purdue University, June 1998.

  27. Porras, P. A. and P. G. Neumann. “Emerald: Event Monitoring Enabling Responses to Anomalous Live Disturbances.” Proceedings of the Twentieth National Information System Security Conference, Baltimore, MD, 1997.

  28. Neumann, P. G. and P. A. Porras. “Experience with EMERALD to Date.” First USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999.

  29. Lee, W., S. J. Stolfo, and K. W. Mok. “A Data Mining Framework for Building Intrusion Detection Models.” Proceedings of the Twentieth IEEE Symposiumon Security and Privacy, Oakland, CA, 1999.

   

< Back Contents Next >

Save to MyCKS

 

Breaking News

One of the primary architects of OpenCable, Michael Adams, explains the key concepts of this initiative in his book OpenCable Architecture.

Expert Advice

Ralph Droms, Ph.D., author of The DHCP Handbook and chair of the IETF Dynamic Host Configuration Working Group, guides you to his top picks for reliable DHCP-related information.

Just Published

Residential Broadband, Second Edition
by George Abe

Introduces the topics surrounding high-speed networks to the home. It is written for anyone seeking a broad-based familiarity with the issues of residential broadband (RBB) including product developers, engineers, network designers, business people, professionals in legal and regulatory positions, and industry analysts.

             
     

From the Brains at InformIT

|

Contact Us

|

Copyright, Terms & Conditions

|

Privacy Policy

 

© Copyright 2000 InformIT. All rights reserved.