Open Access
IDIOT - Users Guide
TLDR
This manual gives a detailed technical description of the IDIOT intrusion detection system from the COAST Laboratory at Purdue University and is intended to help anyone who wishes to use, extend or test theIDIOT system.Abstract:
This manual gives a detailed technical description of the IDIOT intrusion detection system from the COAST Laboratory at Purdue University. It is intended to help anyone who wishes to use, extend or test the IDIOT system. Familiarity with security issues, and intrusion detection in particular, is assumed.read more
Citations
More filters
Intrusion Detection Systems: A Survey and Taxonomy
TL;DR: The taxonomy consists of a classification first of the detection principle, and second of certain operational aspects of the intrusion detection system as such, which are used predictively to survey and classify a number of research prototypes.
Proceedings ArticleDOI
An architecture for intrusion detection using autonomous agents
TL;DR: This paper reviews the architecture for a distributed intrusion detection system based on multiple independent entities working collectively, and calls these entities autonomous agents, which solves some of the problems previously mentioned.
Journal ArticleDOI
Intrusion detection using autonomous agents
Eugene H. Spafford,Diego Zamboni +1 more
TL;DR: The AAFID architecture and the existing prototype, as well as some design and implementation experiences and future research issues are described, which constitute a useful framework for the research and testing of intrusion detection algorithms and mechanisms.
Software vulnerability analysis
Ivan Krsul,Eugene H. Spafford +1 more
TL;DR: A selection of images from around the world have been collected and edited for clarity and brevity.
Journal ArticleDOI
Taxonomy and Survey of Collaborative Intrusion Detection
TL;DR: The entire framework of requirements, building blocks, and attacks as introduced is used for a comprehensive analysis of the state of the art in collaborative intrusion detection, including a detailed survey and comparison of specific CIDS approaches.
References
More filters
Journal Article
WHO Technical Report.
TL;DR: The Feather River Coordinated Resource Management Group (FR-CRM) has been restoring channel/ meadow/ floodplain systems in the Feather River watershed since 1985 and recognized the possibility of a significant change in carbon stocks in these restored meadows and valleys.
Book
Programming Perl
Larry Wall,Mike Loukides +1 more
TL;DR: This third edition of Programming Perl has been expanded to cover version 5.6 of this maturing language, and new topics include threading, the compiler, Unicode, and other new features that have been added since the previous edition.
Classification and detection of computer intrusions
TL;DR: This document summarizes current capabilities, research and operational priorities, and plans for further studies that were established at the 2015 USGS workshop on quantitative hazard assessments of earthquake-triggered landsliding and liquefaction in the western hemisphere.
An Application of Pattern Matching in Intrusion Detection
Sandeep Kumar,Eugene H. Spafford +1 more
TL;DR: A generalized model for matching intrusion signatures based on Colored Petri Nets is presented, and some of its properties are derived.
Book
Programming Languages: Concepts and Constructs
TL;DR: This chapter discusses Functional Programming in a Typed Language, which combines Functional Programming with Lists, and Object-Oriented Programming in C++, a Dialect of Lisp.