 
 
 
 
 
 
   
 Next: About this document ...
 Up: Detecting and Countering System
 Previous: Conclusion and Future Work
- 1
- 
J. Balasubramaniyan et al.
 An Architecture for Intrusion Detection using Autonomous Agents.
 Technical Report TR-98-05, Department of Computer Science, Purdue
  University, June 1998.
- 2
- 
T. Bowen, D. Chee, M. Segal, R. Sekar, T. Shanbhag, and P. Uppuluri.
 Building survivable systems: An integrated approach based on
  intrusion detection and damage containment.
 Proceedings of the DARPA Information Survivability Conference
  and Exposition (DISCEX) 2000, 2:84-99, 2000.
- 3
- 
S. Forrest et al.
 A sense of self for unix processes.
 In Proceedings of the 1996 Symposium on Security and Privacy,
  pages 120-128, Oakland, CA, May 6-8 1996.
- 4
- 
T. Fraser, L. Badger, and Feldman M.
 Hardening COTS software with generic software wappers.
 In Proceedings of the 1999 Symposium on Security and Privacy,
  1999.
- 5
- 
K. Ilgun, R. Kermmerer, and P. Porras.
 State transition analysis: A rule-based intrusion detection approach.
 IEEE Transactions on Software Engineering, 21(3):181-199,
  1995.
- 6
- 
C. Kahn et al.
 A common intrusion detection framework.
 Journal of Computer Security, 1998.
- 7
- 
C. Ko, G. Fink, and K. Levitt.
 Automated Detection of Vulnerabilities in Privileged Programs Using
  Execution Monitoring.
 In Proceedings of the 10th Computer Security Application
  Conference, Orlando, FL, December 5-9, 1994.
- 8
- 
C. Ko, M. Ruschitzka, and K. Levitt.
 Execution Monitoring of Security-Critical Programs in Distributed
  Systems: A Specification-Based Approach.
 In Proceedings of the 1997 IEEE Symposium on Security and
  Privacy, Oakland, California, 1997.
- 9
- 
S. Kumar.
 Classification and Detection of Computer Intrusions.
 PhD thesis, Department of Computer Science, Purdue University, August
  1995.
- 10
- 
Karen Oostendorp, Christopher Vance, Kelly Djahandari, Benjamin Uecker, and Lee
  Badger.
 Preliminary Wrapper Definition Language Specification.
 Technical Report #0684, Trusted Information Systems, Inc., 1997.
- 11
- 
R. Sekar and P. Uppuluri.
 Synthesizing fast intrusion prevention/detection systems from
  high-level specifications.
 Proceedings of the 8th USENIX Security Symposium, pages 63-78,
  1999.
Calvin Ko
2000-06-13