[244] in Intrusion Detection Systems
Re: Some more refs
daemon@ATHENA.MIT.EDU (Gene Spafford)
Thu May 25 16:33:01 1995
Date: Fri, 26 May 1995 02:04:25 +1000
To: ids@uow.edu.au
In-Reply-To: Message from jtruitt@iu.net (Jim Truitt) of
"Wed, 24 May 1995 23:00:26 +1000"
<199505241300.XAA15713@wyrm.cc.uow.edu.au>
From: spaf@cs.purdue.edu (Gene Spafford)
Reply-To: ids@uow.edu.au
> Courtesy of SAIC's security documents archive.
>
> URL: http://mls.saic.com/docs.html
>
> Intrusion Detection
>
> A Software Architecture to support Misuse Intrusion Detection
> (March 1995, 250K)
> An Application of Pattern Matching in Intrusion Detection
> (June 1994, 674K)
> Algorithm for Distrubuted Recognition and Accountability
> (Undated, 209K)
> A Pattern Matching Model for Misuse Intrusion Detection
> (Undated, 191K)
> AI Approach to Intrusion Detection
> (June 1994, 168K)
> Intrusion Detection In Computers
> (January 1991, 12K text)
> USTAT - A Real-time Intrusion Detection System for UNIX
> (November 1992, 1.3M)
Note that several of those are papers originally from COAST. You can
find the originals in our archive.
--spaf