A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION

by Sandeep Kumar , Eugene H. Spafford
Citations:150 - 4 self

Documents Related by Co-Citation

122 USTAT: A Real-time Intrusion Detection System for UNIX – Koral Ilgun - 1992
93 The COPS security checker system – Daniel Farmer, Eugene H. Spafford - 1994
455 An intrusion-detection model – Dorothy E. Denning - 1987
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
225 Network intrusion detection – B Mukherjee, L T Heberlein, K N Levitt - 1994
147 A Network Security Monitor – L Heberlein, G Dias, K Levitt, B Mukherjee, J Wood, D Wolber - 1990
133 Classification And Detection Of Computer Intrusions – Sandeep Kumar - 1995
93 DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype – Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, L. Todd Heberlein, Che-lin Ho, Karl N. Levitt, Biswanath Mukherjee, Stephen E. Smaha, Tim Grance, Daniel M. Teal, Doug Mansur - 1991
79 Model-based intrusion detection – Thomas Garvey, Teresa Lunt - 1991
103 Haystack: An intrusion detection system – Stephen Smaha - 1988
79 Expert Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference – Michael M Sebring, R Alan Whitehurst - 1988
68 An Application of Pattern Matching in Intrusion Detection – Sandeep Kumar , Eugene H. Spafford - 1994
68 Artificial Intelligence and Intrusion Detection: Current and Future Directions – Jeremy Frank, Nsa Urp Mda--c - 1994
97 GrIDS - A Graph Based Intrusion Detection System For Large Networks – S. Staniford-chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagl, K. Levitt, C. Wee, R. Yip, D. Zerkle - 1996
501 Cryptography and Data Security – Dorothy E. Denning, Peter, J. Denning - 1982
56 Operating system penetration – Richard Linde - 1975
351 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
116 Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring – Calvin Ko, George Fink, Karl Levitt - 1994
176 Computer Immunology – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji - 1996