Sciweavers

RAID
2001
Springer
13 years 9 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
RAID
2001
Springer
13 years 9 months ago
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Ka...
RAID
2001
Springer
13 years 9 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
RAID
2001
Springer
13 years 9 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
RAID
2001
Springer
13 years 9 months ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
RAID
2001
Springer
13 years 9 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
RAID
2001
Springer
13 years 9 months ago
From Declarative Signatures to Misuse IDS
Jean-Philippe Pouzol, Mireille Ducassé