參考文獻 |
[ASF BULLETIN 20020620] apache 安全漏洞公告http://httpd.apache.org/info/security_bulletin_20020617.txt
[CBS 2006] Abhishek Chaturvedi, Sandeep Bhatkar and R. Sekar, “Improving Attack Detection in Host-Based IDS by Learning Properties of System Call Arguments,” In IEEE Symposium on Security and Privacy, May 2006
[CVE-2004-0488] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0488
[DEKLST 2002] Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, and Pang-Ning Tan, “Data Mining for Network Intrusion Detection,” In Proceedings of NSF Workshop on Next Generation Data Mining, 2002.
[ELS 2001] E. Eskin, W. Lee, and S. J. Stolfo, “Modeling system calls or intrusion detection with dynamic window size,” In Proceedings of DARPA Information Survivability Conference & Exposition II, 2001(DISCEX '01), Anaheim, CA, June 2001.
[FHSL 1996] S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff , “A sense of self for unix processes,” In Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996.
[FKFLG 2003] Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, and Weibo Gong, “Anomaly Detection Using Call Stack Information,” In Proceedings of the 2003 IEEE Symposium on Security and Privacy.
[GJM 2002] Jonathon T. Giffin Somesh Jha Barton P. Miller, “Detecting Manipulated Remote Call Streams,” In the 11 th USENIX Security Symposium, 2002.
[gobbles-own-linux.c]
http://members.lycos.co.uk/r34ct/main/PRIVATE/spl0it/gobbles-own-linux.c
[HF 2000] S. A. Hofmeyr, S.Forrest, “Intrusion detection using sequences of system calls,” (http://www.cs.virginia.edu/~jones/cs851sig/slides/forrest-signature.ppt)
[HFS 1998] S. A. Hofmeyr, S. Forrest, and A. Somayaji , “Intrusion detection using sequences of system calls,” In Journal of Computer Security, Volume 6, pages 151-180, 1998.
[KMVV 2003] C Kruegel, D Mutz, F Valeur, G Vigna – Springer, “On the detection of anomalous system call arguments,” In the 8th European Symposium on Research in Computer Security, 2003.
[LC 2004] L.C. Lam and T.C. Chiueh, “Automatic Extraction of Accurate Application-Specific Sandboxing Policy,” In RAID 2004 , pages 1-20
[LM 2005] Alexander Liu, Cheryl Martin, “A Comparison of System Call Feature
Representations for Insider Threat Detection,” In Proceedings of the 2005 IEEE
Workshop on Information Assurance and Security.
[LSSP 2005] Jidong Long, Daniel G. Schwartz, Sara Stoecklin, and Mahesh K. Patel
, “Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection,” In the Conference of Information Technology Coding and Computing, 2005.
[LV 2002] Yihua Liao, V. Rao Vemuri, “Using Text Categorization Techniques for Intrusion Detection,” In the 11 th USENIX Security Symposium, 2002.
[openssl-too-open.c] http://bismark.extracon.it/exploits/archivio/files/SSL_ETC/APACHEOPENSSL_2.C
[RHSA-2004:245-14] “Moderate: apache, mod_ssl security update,” In http://rhn.redhat.com/errata/RHSA-2004-245.html
[SBDB 2001] R. Sekar M. Bendre D. Dhurjati P. Bollineni, “A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors,” In Proceedings of the 2001 IEEE Symposium on Security and Privacy.
[SecurityFocus 1] “Apache Mod_SSL SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability,” In http://www.securityfocus.com/bid/10355
[SecurityFocus 2] “Apache Chunked-Encoding Memory Corruption Vulnerability,” In http://www.securityfocus.com/bid/5033
[WD 2001] D. Wagner and D. Dean, “Intrusion detection via static analysis,” In Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, 2001.
[WDD 2000] A. Wespi, M. Dacier, and H. Debar, “Intrusion detection using variable-length audit trail patterns,” In Proceedings of the 3rd symposium on Recent Advances in Intrusion Detection (RAID 2000), Toulouse, France, October 2000.
[YA 2004] M.M. Yasin and A.A.Awan, “A Study of Host-Based IDS using System Calls,” In IEEE Networking and Communication, 2004, June 2004. |