Testing network-based intrusion detection signatures using mutant exploits
- 25 October 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Validation of sensor alert correlatorsIEEE Security & Privacy, 2003
- Testing Intrusion detection systemsACM Transactions on Information and System Security, 2000
- Testing and evaluating computer intrusion detection systemsCommunications of the ACM, 1999
- A 'crystal ball' for software liabilityComputer, 1997
- Fault injection: a method for validating computer-system dependabilityComputer, 1995
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- Fault injection for dependability validation: a methodology and some applicationsIEEE Transactions on Software Engineering, 1990
- Hints on Test Data Selection: Help for the Practicing ProgrammerComputer, 1978