[244] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Some more refs

daemon@ATHENA.MIT.EDU (Gene Spafford)
Thu May 25 16:33:01 1995

Date: Fri, 26 May 1995 02:04:25 +1000
To: ids@uow.edu.au
In-Reply-To: Message from jtruitt@iu.net (Jim Truitt)  of
    "Wed, 24 May 1995 23:00:26 +1000"
    <199505241300.XAA15713@wyrm.cc.uow.edu.au> 
From: spaf@cs.purdue.edu (Gene Spafford)
Reply-To: ids@uow.edu.au

> Courtesy of SAIC's security documents archive.
> 
> URL:    http://mls.saic.com/docs.html
> 
> Intrusion Detection
> 
>      A Software Architecture to support Misuse Intrusion Detection
>      (March 1995, 250K) 
>      An Application of Pattern Matching in Intrusion Detection
>      (June 1994, 674K) 
>      Algorithm for Distrubuted Recognition and Accountability
>      (Undated, 209K) 
>      A Pattern Matching Model for Misuse Intrusion Detection
>      (Undated, 191K) 
>      AI Approach to Intrusion Detection
>      (June 1994, 168K) 
>      Intrusion Detection In Computers
>      (January 1991, 12K text) 
>      USTAT - A Real-time Intrusion Detection System for UNIX
>      (November 1992, 1.3M) 

Note that several of those are papers originally from COAST.  You can
find the originals in our archive.

--spaf

home help back first fref pref prev next nref lref last post