AMNESIA: analysis and monitoring for neutralizing SQL-injection attacks

WGJ Halfond, A Orso - Proceedings of the 20th IEEE/ACM international …, 2005 - dl.acm.org
The use of web applications has become increasingly popular in our routine activities, such
as reading the news, paying bills, and shopping on-line. As the availability of these services …

Intrusion detection: A survey

A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …

Combining static analysis and runtime monitoring to counter SQL-injection attacks

WGJ Halfond, A Orso - Proceedings of the third international workshop …, 2005 - dl.acm.org
Our dependence on web applications has steadily increased, and we continue to integrate
them into our everyday routine activities. When we are making reservations, paying bills …

Real-time intrusion detection for ad hoc networks

L Stamouli, PG Argyroudis… - Sixth IEEE International …, 2005 - ieeexplore.ieee.org
A mobile ad hoc network is a collection of nodes that are connected through a wireless
medium and form rapidly changing topologies. The widely accepted existing routing …

A machine learning evaluation of an artificial immune system

M Glickman, J Balthrop, S Forrest - Evolutionary Computation, 2005 - direct.mit.edu
ARTIS is an artificial immune system framework which contains several adaptive
mechanisms. LISYS is a version of ARTIS specialized for the problem of network intrusion …

On the role of simulations in engineering self-organising MAS: The case of an intrusion detection system in TuCSoN

L Gardelli, M Viroli, A Omicini - International Workshop on Engineering …, 2005 - Springer
The intrinsic complexity of self-organising MASs (multi-agent systems) suggests the use of
formal methods at early stages of the design process in order to predict global system …

[PDF][PDF] A nonparametric multichart CUSUM test for rapid intrusion detection

AG Tartakovsky, BL Rozovskii… - Proceedings of Joint …, 2005 - researchgate.net
An efficient sequential nonparametric multichart (multichannel) CUSUM-type detection test
for detecting changes in multichannel sensor systems is proposed. While there is a wide …

A framework for detecting network-based code injection attacks targeting Windows and UNIX

S Andersson, A Clark, G Mohay… - 21st Annual …, 2005 - ieeexplore.ieee.org
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer
overflows and heap buffer overflows account for roughly half of the vulnerabilities …

[PDF][PDF] 聚类在网络入侵的异常检测中的应用

严晓光, 褚学征 - 计算机系统应用, 2005 - csa.org.cn
聚类在网络入侵的异常检测中的应用 Page 1 让算机系统应用 2005年第10期 聚类在网络入侵的
异常检测中的应用 ApplicationtoClusterAlgorithmin Anomaly Detection of Networklntrusion …

[PDF][PDF] An information-theoretic measure of intrusion detection capability

G Gu, P Fogla, D Dagon, W Lee, B Skoric - … Tech, Tech. Rep. GIT-CC-05 …, 2005 - Citeseer
A fundamental problem in intrusion detection is what metric (s) can be used to objectively
evaluate an intrusion detection system (IDS) in terms of its ability to correctly classify events …