Next: About this document ...
Up: Detecting and Countering System
Previous: Conclusion and Future Work
- 1
-
J. Balasubramaniyan et al.
An Architecture for Intrusion Detection using Autonomous Agents.
Technical Report TR-98-05, Department of Computer Science, Purdue
University, June 1998.
- 2
-
T. Bowen, D. Chee, M. Segal, R. Sekar, T. Shanbhag, and P. Uppuluri.
Building survivable systems: An integrated approach based on
intrusion detection and damage containment.
Proceedings of the DARPA Information Survivability Conference
and Exposition (DISCEX) 2000, 2:84-99, 2000.
- 3
-
S. Forrest et al.
A sense of self for unix processes.
In Proceedings of the 1996 Symposium on Security and Privacy,
pages 120-128, Oakland, CA, May 6-8 1996.
- 4
-
T. Fraser, L. Badger, and Feldman M.
Hardening COTS software with generic software wappers.
In Proceedings of the 1999 Symposium on Security and Privacy,
1999.
- 5
-
K. Ilgun, R. Kermmerer, and P. Porras.
State transition analysis: A rule-based intrusion detection approach.
IEEE Transactions on Software Engineering, 21(3):181-199,
1995.
- 6
-
C. Kahn et al.
A common intrusion detection framework.
Journal of Computer Security, 1998.
- 7
-
C. Ko, G. Fink, and K. Levitt.
Automated Detection of Vulnerabilities in Privileged Programs Using
Execution Monitoring.
In Proceedings of the 10th Computer Security Application
Conference, Orlando, FL, December 5-9, 1994.
- 8
-
C. Ko, M. Ruschitzka, and K. Levitt.
Execution Monitoring of Security-Critical Programs in Distributed
Systems: A Specification-Based Approach.
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy, Oakland, California, 1997.
- 9
-
S. Kumar.
Classification and Detection of Computer Intrusions.
PhD thesis, Department of Computer Science, Purdue University, August
1995.
- 10
-
Karen Oostendorp, Christopher Vance, Kelly Djahandari, Benjamin Uecker, and Lee
Badger.
Preliminary Wrapper Definition Language Specification.
Technical Report #0684, Trusted Information Systems, Inc., 1997.
- 11
-
R. Sekar and P. Uppuluri.
Synthesizing fast intrusion prevention/detection systems from
high-level specifications.
Proceedings of the 8th USENIX Security Symposium, pages 63-78,
1999.
Calvin Ko
2000-06-13