ASAX: Software architecture and rule-based language for universal audit trail analysis

N Habra, BL Charlier, A Mounji, I Mathieu - Computer Security—ESORICS …, 1992 - Springer
After a brief survey of the problems related to audit trail analysis and of some approaches to
deal with them, the paper outlines the project ASAX which aims at providing an advanced …

Using internal sensors for computer intrusion detection

D Zamboni - 2001 - search.proquest.com
Using internal sensors for computer intrusion detection Using internal sensors for computer
intrusion detection Abstract This dissertation introduces the concept of using internal sensors to …

Intrusion detection: systems and models

JS Sherif, TG Dearmond - Proceedings. Eleventh IEEE …, 2002 - ieeexplore.ieee.org
Organizations more often than not lack comprehensive security policies and are not
adequately prepared to protect their systems against intrusions. This paper puts forward a …

[PDF][PDF] HOST-BASED MISUSE DETECTION AND CONVENTIONAL OPERATING SYSTEMS'AUDIT DATA COLLECTION

KE Price - Master's thesis, Purdue University, 1997 - cerias.purdue.edu
In this chapter, we review the rise of computer crime and discuss the importance of computer
security. We motivate the need for misuse detection and discuss misuse detection's reliance …

[PDF][PDF] Обнаружение компьютерных атак на основе анализа поведения сетевых объектов: дисс.… канд. физ.-мат. наук: 05.13. 11

ДЮ Гамаюнов - Москва, 2007 - cs.msu.ru
Актуальность темы. Компьютерные сети за несколько последних десятилетий из чисто
технического решения превратились в глобальное явление, развитие которого …

Intrusion detection: the art and the practice. Part I

JS Sherif, R Ayers, TG Dearmond - Information Management & …, 2003 - emerald.com
Organizations more often than not lack comprehensive security policies and are not
adequately prepared to protect their systems against intrusions. This paper puts forward a …

A hardware design model for cryptographic algorithms

J Daemen, R Govaerts, J Vandewalle - Computer Security—ESORICS 92 …, 1992 - Springer
A hardware implementation model is proposed that can be used in the design of stream
ciphers, block ciphers and cryptographic hash functions. The cryptographic finite state …

Continuous assessment of a unix configuration: Integrating intrusion detection and configuration analysis

A Mounji, B Le Charlier - … of SNDSS'97: Internet Society 1997 …, 1997 - ieeexplore.ieee.org
Computer security is a topic of growing concern because, on the one hand, the power of
computers continues to increase at exponential speed and all computers are virtually …

[PDF][PDF] Современные некоммерческие средства обнаружения атак

Д Гамаюнов, Р Смелянский - Программные системы и …, 2002 - istina.msu.ru
Аннотация В данной статье приводится обзор и сравнительный анализ нескольких
существующих некоммерческих систем обнаружения атак (СОА) на компьютерные …

[PDF][PDF] Optimizing a rule-based intrusion detection language to handle a large number of signatures

X Martin, B Le Charlier - Proceedings of the 5th Conference on …, 2006 - researchgate.net
We present an optimization technique that allows a stateful rule-based intrusion detection
language to handle more efficiently a large number of attack signatures, or any other kind of …