Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits
- 10 October 2002
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detectorPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A sense of self for Unix processesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Anomaly detection in embedded systemsIEEE Transactions on Computers, 2002
- Characterizing the behavior of a program using multiple-length N-gramsPublished by Association for Computing Machinery (ACM) ,2001
- Towards a taxonomy of intrusion-detection systemsComputer Networks, 1999
- Intrusion detection using sequences of system callsJournal of Computer Security, 1998