-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreport.bib
145 lines (144 loc) · 7.3 KB
/
report.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
@article{8274922,
author={Meng, Weizhi and Tischhauser, Elmar Wolfgang and Wang, Qingju and Wang, Yu and Han, Jinguang},
journal={IEEE Access},
title={When Intrusion Detection Meets Blockchain Technology: A Review},
note={\href{https://ieeexplore.ieee.org/document/8274922}{https://ieeexplore.ieee.org/document/8274922}},
year={2018},
volume={6},
number={},
pages={10179-10188},
doi={10.1109/ACCESS.2018.2799854}}
@techreport{McAfee_next_gen_IDS,
author={Fengmin Gong},
title={McAfee Network Security Platform: The Next-Generation Network IPS},
note={\href{http://www.webtorials.com/main/resource/papers/McAfee/paper3/next-generation-network-ips.pdf}{http://www.webtorials.com/main/resource/papers/McAfee/paper3/next-generation-network-ips.pdf}},
year={2003},
address={San Jose, 6220 America Center Drive, United States},
organization={McAfee Network Security Platform}}
@techreport{wiki_HIDS,
author={Wikipedia},
title={Host-based intrusion detection system},
year={2023},
note={\href{https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system}{https://en.wikipedia.org/wiki/Host-based\_intrusion\_detection\_system}}}
@techreport{wiki_IDS,
author={Wikipedia},
title={Intrusion detectino system},
year={2023},
note={\href{https://en.wikipedia.org/wiki/Intrusion_detection_system}{https://en.wikipedia.org/wiki/Intrusion\_detection\_system}}}
@techreport{NIST_IDPS,
author={Keren Scarfone, Peter Mell},
title={Guide to Intrusion Detection and Prevention Systems (IDPS)},
year={2007},
doi={10.6028/nist.sp.800-94},
note={\href{http://dx.doi.org/10.6028/nist.sp.800-94}{http://dx.doi.org/10.6028/nist.sp.800-94}}}
@inproceedings{emerald-niss97,
AUTHOR = {Phillip {A.} Porras and Peter {G.} Neumann},
TITLE = {{EMERALD:} Event Monitoring Enabling Responses to Anomalous Live Disturbances},
BOOKTITLE = {1997 National Information Systems Security Conference},
YEAR = {1997},
MONTH = {oct},
note={\href{https://www.csl.sri.com/papers/emerald-niss97/}{https://www.csl.sri.com/papers/emerald-niss97/}}}
@inproceedings{Snapp1997DIDSI,
title={DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype},
author={Steven R. Snapp and James Brentano and Gihan V. Dias and Terrance Goan and L. Todd Heberlein and Che-Lin Ho and Karl N. Levitt and Biswanath Mukherjee and Stephen E. Smaha and Timothy Grance and Daniel M. Teal and Douglass L. Mansur},
year={1997},
note={\href{http://dl.lib.uom.lk/handle/123/12232}{http://dl.lib.uom.lk/handle/123/12232}}}
@INPROCEEDINGS{COSSACK,
author={Papadopoulos, C. and Lindell, R. and Mehringer, J. and Hussain, A. and Govindan, R.},
booktitle={Proceedings DARPA Information Survivability Conference and Exposition},
title={Cossack: coordinated suppression of simultaneous attacks},
year={2003},
volume={1},
number={},
pages={2-13 vol.1},
doi={10.1109/DISCEX.2003.1194868},
note={\href{https://ieeexplore.ieee.org/document/1194868}{https://ieeexplore.ieee.org/document/1194868}}}
@article{DOMINO,
author = {Yegneswaran, Vinod and Barford, Paul and Jha, Somesh},
year = {2004},
month = {01},
pages = {},
title = {Global intrusion detection in the DOMINO overlay system},
note={\href{https://www.csl.sri.com/~vinod/papers/domino.pdf}{https://www.csl.sri.com/~vinod/papers/domino.pdf}}}
@article{Netbait,
author = {Chun, Brent and Lee, Jason and Weatherspoon, Hakim},
year = {2004},
month = {07},
pages = {},
title = {Netbait: a Distributed Worm Detection Service},
note={\href{https://www.researchgate.net/publication/2950321_Netbait_a_Distributed_Worm_Detection_Service}{https://www.researchgate.net/publication/2950321\_Netbait\_a\_Distributed\_Worm\_Detection\_Service}}}
@article{PIER,
author = {Huebsch, Ryan and Chun, Brent and Hellerstein, Joseph and Loo, Boon and Maniatis, Petros and Roscoe, Timothy and Shenker, Scott and Stoica, Ion and Yumerefendi, Aydan},
year = {2005},
month = {01},
pages = {},
title = {The Architecture of PIER: an Internet-Scale Query Processor},
note={\href{https://core.ac.uk/download/pdf/76382954.pdf}{https://core.ac.uk/download/pdf/76382954.pdf}}}
@inproceedings{Li2016PMFATP,
title={PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks},
author={Wenjuan Li and Weizhi Meng and Lam-for Kwok and Horace Ho-Shing Ip},
booktitle={International Conference on Network and System Security},
year={2016},
note={\href{https://api.semanticscholar.org/CorpusID:26259037}{https://api.semanticscholar.org/CorpusID:26259037}}}
@INPROCEEDINGS{1698432,
author={Duma, C. and Karresand, M. and Shahmehri, N. and Caronni, G.},
booktitle={17th International Workshop on Database and Expert Systems Applications (DEXA'06)},
title={A Trust-Aware, P2P-Based Overlay for Intrusion Detection},
year={2006},
volume={},
number={},
pages={692-697},
doi={10.1109/DEXA.2006.21},
note={\href{https://ieeexplore.ieee.org/document/1698432}{https://ieeexplore.ieee.org/document/1698432}}}
@InProceedings{10.1007/3-540-45748-8_24,
author="Douceur, John R.",
editor="Druschel, Peter and Kaashoek, Frans and Rowstron, Antony",
title="The Sybil Attack",
booktitle="Peer-to-Peer Systems",
year="2002",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="251--260",
isbn="978-3-540-45748-0",
note={\href{https://www.freehaven.net/anonbib/cache/sybil.pdf}{https://www.freehaven.net/anonbib/cache/sybil.pdf}}}
@techreport{zenarmor_network_intrusion,
title="What is Network Intrusion?",
organization="Sunny Valley Cyber Security Inc. (d/b/a Zenarmor)",
year="2023",
address="19925 Stevens Creek Blvd. Suite 100, Cupertino CA 95014, USA",
note={\href{https://www.zenarmor.com/docs/network-security-tutorials/what-is-network-intrusion}{https://www.zenarmor.com/docs/network-security-tutorials/what-is-network-intrusion}}}
@INPROCEEDINGS{5188784,
author={Fung, Carol J. and Zhang, Jie and Aib, Issam and Boutaba, Raouf},
booktitle={2009 IFIP/IEEE International Symposium on Integrated Network Management},
title={Robust and scalable trust management for collaborative intrusion detection},
year={2009},
volume={},
number={},
pages={33-40},
doi={10.1109/INM.2009.5188784},
note={\href{https://ieeexplore.ieee.org/document/5188784}{https://ieeexplore.ieee.org/document/5188784}}}
@INPROCEEDINGS{6233691,
author={Merkle, Ralph C.},
booktitle={1980 IEEE Symposium on Security and Privacy},
title={Protocols for Public Key Cryptosystems},
year={1980},
volume={},
number={},
pages={122-122},
doi={10.1109/SP.1980.10006},
note={\href{https://ieeexplore.ieee.org/document/6233691}{https://ieeexplore.ieee.org/document/6233691}}}
@inproceedings{Bayer1993ImprovingTE,
title={Improving the Efficiency and Reliability of Digital Time-Stamping},
author={Dave Bayer},
year={1993},
note={\href{https://api.semanticscholar.org/CorpusID:14496769}{https://api.semanticscholar.org/CorpusID:14496769}}}
@INPROCEEDINGS{8525392,
author={Wüst, Karl and Gervais, Arthur},
booktitle={2018 Crypto Valley Conference on Blockchain Technology (CVCBT)},
title={Do you Need a Blockchain?},
year={2018},
volume={},
number={},
pages={45-54},
doi={10.1109/CVCBT.2018.00011},
note={\href{https://ieeexplore.ieee.org/document/8525392}{https://ieeexplore.ieee.org/document/8525392}}}