Insertion, evasion, and denial of service: Eluding network intrusion detection (1998)

by Thomas H. Ptacek , Timothy N. Newsham
Citations:281 - 0 self

Documents Related by Co-Citation

686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
174 Network intrusion detection: Evasion, traffic normalization, and end-toend protocol semantics – M Handley, V Paxson, C Kreibich - 2001
822 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
530 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
277 Intrusion Detection via Static Analysis – David Wagner, Drew Dean - 2001
195 Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory – J Mchugh
484 How to 0wn the Internet in Your Spare Time – Stuart Staniford, Vern Paxson, Nicholas Weaver - 2002
342 ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay – George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen - 2002
300 Autograph: Toward automated, distributed worm signature detection – Hyang-ah Kim - 2004
284 Difficulties in Simulating the Internet – Sally Floyd, Vern Paxson - 2001
143 The 1999 DARPA off-line intrusion detection evaluation – Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das - 2000
133 Classification And Detection Of Computer Intrusions – Sandeep Kumar - 1995
109 NetSTAT: A Network-based Intrusion Detection System – Giovanni Vigna, Richard A. Kemmerer - 1999
72 Active Mapping: Resisting NIDS Evasion without Altering Traffic – Umesh Shankar, Umesh Shankar - 2002
354 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
263 Code-Red: a case study on the spread and victims of an Internet worm – David Moore, Colleen Shannon, k claffy - 2002
281 Internet Quarantine: Requirements for Containing Self-Propagating Code – David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage - 2003
175 Mimicry Attacks on Host-Based Intrusion Detection Systems – David Wagner - 2002
185 A Virtual Honeypot Framework – Niels Provos - 2004