GrIDS - A Graph Based Intrusion Detection System For Large Networks (1996)

by S. Staniford-chen , S. Cheung , R. Crawford , M. Dilger , J. Frank , J. Hoagl , K. Levitt , C. Wee , R. Yip , D. Zerkle
Venue:In Proceedings of the 19th National Information Systems Security Conference
Citations:97 - 2 self

Documents Related by Co-Citation

147 A Network Security Monitor – L Heberlein, G Dias, K Levitt, B Mukherjee, J Wood, D Wolber - 1990
225 Network intrusion detection – B Mukherjee, L T Heberlein, K N Levitt - 1994
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
279 Insertion, evasion, and denial of service: Eluding network intrusion detection – Thomas H. Ptacek, Timothy N. Newsham - 1998
148 A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION – Sandeep Kumar, Eugene H. Spafford
133 Classification And Detection Of Computer Intrusions – Sandeep Kumar - 1995
351 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
93 DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype – Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, L. Todd Heberlein, Che-lin Ho, Karl N. Levitt, Biswanath Mukherjee, Stephen E. Smaha, Tim Grance, Daniel M. Teal, Doug Mansur - 1991
70 Defending a Computer System Using Autonomous Agents – Mark Crosbie, Gene Spafford - 1995
176 Computer Immunology – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji - 1996
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
283 Computer Security Threat Monitoring and Surveillance – J Anderson - 1980
8 Modeling Correlated Alarms in Network Management Systems – Livio Ricciulli, Nachum Shacham - 1996
99 Cooperating security managers: a peer-based intrusion detection system – G B White, E A Fisch, U W Pooch - 1996
144 Probabilistic Alert Correlation – Alfonso Valdes, Keith Skinner - 2001
158 Practical automated detection of stealthy portscans – S Staniford, J A Hoagland, J M McAlerney - 2002
173 Alert Correlation in a Cooperative Intrusion Detection Framework – F Cuppens, A Miege - 2002
113 A Requires/Provides Model for Computer Attacks – Steven J. Templeton, Karl Levitt - 2000
47 Active Defense of a Computer System Using Autonomous Agents – Mark Crosbie, Gene Spafford - 1995