GrIDS - A Graph Based Intrusion Detection System For Large Networks (1996)

by S. Staniford-chen , S. Cheung , R. Crawford , M. Dilger , J. Frank , J. Hoagl , K. Levitt , C. Wee , R. Yip , D. Zerkle
Venue:In Proceedings of the 19th National Information Systems Security Conference
Citations:98 - 2 self

Documents Related by Co-Citation

149 A Network Security Monitor – L Heberlein - 1990
150 A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION – Sandeep Kumar, Eugene H. Spafford
226 Network intrusion detection – B Mukherjee, L T Heberlein, K N Levitt - 1994
354 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
530 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
109 NetSTAT: A Network-based Intrusion Detection System – Giovanni Vigna, Richard A. Kemmerer - 1999
71 Defending a Computer System Using Autonomous Agents – Mark Crosbie, Gene Spafford - 1995
133 Classification And Detection Of Computer Intrusions – Sandeep Kumar - 1995
281 Insertion, evasion, and denial of service: Eluding network intrusion detection – Thomas H. Ptacek, Timothy N. Newsham - 1998
178 Computer Immunology – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji - 1996
284 Computer Security Threat Monitoring and Surveillance – J P Anderson - 1980
99 Cooperating security managers: A peer-based intrusion detection system – G White, E Fisch, U Pooch - 1994
8 Modeling Correlated Alarms in Network Management Systems – Livio Ricciulli, Nachum Shacham - 1996
145 An Architecture for Intrusion Detection using Autonomous Agents – Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford, Diego Zamboni - 1998
68 NADIR: an automated system for detecting network intrusion and misuse – J Hochberg, K Jackson, C Stallings, J F McClary, D DuBois, J Ford - 1993
113 A Requires/Provides Model for Computer Attacks – Steven J. Templeton, Karl Levitt - 2000
158 Practical automated detection of stealthy portscans – S Staniford, J A Hoagland, J M McAlerney - 2002
173 Alert correlation in a cooperative intrusion detection framework – F Cuppens, A Mige - 2002