Sciweavers

Share
RAID
2001
Springer
10 years 2 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented diļ¬€ers from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
RAID
2001
Springer
10 years 2 months ago
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Ka...
RAID
2001
Springer
10 years 2 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
RAID
2001
Springer
10 years 2 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
RAID
2001
Springer
10 years 2 months ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
RAID
2001
Springer
10 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
RAID
2001
Springer
10 years 2 months ago
From Declarative Signatures to Misuse IDS
Jean-Philippe Pouzol, Mireille Ducassé
books