next up previous contents index
Next: Index Up: csahtml Previous: 5.7 Discussion

References

1
Amoroso, E. (1999).
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response.
Intrusion.net Books, Sparta, New Jersey.

2
Anderson, D., Lunt, T. F., Javitz, H., Tamaru, A., and Valdes, A. (1995).
Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (nides).
Technical Report SRI-CSL-95-06, SRI International.

3
anonymous (1997).
Maximum Security.
Sams.net Publishing, Indianapolis, IN.

4
Bace, R. G. (2000).
Intrusion Detection.
MacMillan Technical Publishing, Indianapolis.

5
Bleha, S., Slivinsky, C., and Hussien, B. (1990).
Computer-access security systems using keystroke dynamics.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 12(12):1217-1222.

6
DeVault, K., Tucey, N., and Marchette, D. (2003).
Analyzing process table and window title data for user identification in a windows environment.
Technical Report NSWCDD/TR-03/122, Naval Surface Warfare Center.

7
Early, J. P. and Brodley, C. E. (2003).
Behavioral authentication of server flows.
In The 19th Annual Computer Security Applications Conference.
to appear.

8
Escamilla, T. (1998).
Intrusion Detection: Network Security Beyond the Firewall.
John Wiley & Sons, Inc., New York.

9
Forrest, S. and Hofmeyr, S. A. (In press).
Immunology as information processing.
In Segel, L. A. and Cohen, I., editors, Design Prinicples for the Immune System and Other Distributed Autonomous Systems, Santa Fe Institute Studies in the Sciences of Complexity. Oxford University Press, Oxford, UK.
Also available at www.cs.unm.edu/$ \sim$forrest/ism_papers.htm.

10
Forrest, S., Hofmeyr, S. A., and Somayaji, A. (1997).
Computer immunology.
Communications of the ACM, 40:88-96.

11
Forrest, S., Perelson, A. S., Allen, L., and Cherukuri, R. (1994).
Self-nonself discrimination in a computer.
In 1994 IEEE Symposium on Research in Security and Privacy.
Also available at www.cs.unm.edu/$ \sim$forrest/isa_papers.htm.

12
Giles, K., Marchette, D. J., and Priebe, C. E. (2003).
A backscatter characterization of denial-of-service attacks.
In Proceedings of the Joint Statistical Meetings.
to appear.

13
Karonski, M., Singer, K., and Scheinerman, E. (1999).
Random intersection graphs: the subgraph problem.
Combinatorics, Probability and Computing, 8:131-159.

14
Kephart, J. O. and White, S. R. (1991).
Directed-graph epidemiological models of computer viruses.
In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 343-359.

15
Kephart, J. O. and White, S. R. (1993).
Measuring and modeling computer virus prevalence.
In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 2-15.

16
Lin, D.-T. (1997).
Computer-access authentication with neural network based keystroke identity verification.
In International Conference on Neural Networks, pages 174-178.

17
Marchette, D. J.
Passive detection of denial of service attacks on the internet.
In Chen, W., editor, Statistical Methods in Computer Security. Marcel Dekker.
to appear.

18
Marchette, D. J. (2001).
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint.
Springer, New York.

19
Marchette, D. J. (2002).
A study of denial of service attacks on the internet.
In Proceedings of the Army Conference on Applied Statistics, pages 41-60.

20
Marchette, D. J. (2003).
Profiling users by their network activity.
In Proceedings of the Joint Statistical Meetings.
to appear.

21
Marchette, D. J. (2004).
Random Graphs for Statistical Pattern Recognition.
John Wiley & Sons, New York.

22
Maxion, R. A. (2003).
Masquerade detection using enriched command lines.
In International conference on dependable systems and networks(DNS-03). IEEE Computer Society Press.

23
Maxion, R. A. and Townsend, T. N. (2002).
Masquerade detection using truncated command lines.
In International conference on dependable systems and networks(DNS-02). IEEE Computer Society Press.

24
Moore, D., Voelker, G. M., and Savage, S. (2001).
Infering Internet denial-of-service activity.
Available on the web at www.usenix.org/publications/library/ proceedings/sec01/moore.html.
USENIX Security '01.

25
Northcutt, S., Novak, J., and McLaclan, D. (2001).
Network Intrusion Detection. An Analyst's Handbook.
New Riders, Indianapolis.

26
Obaidat, M. S. and Sadoun, B. (1997).
Verification of computer users using keystroke dynamics.
IEEE Transactions on Systems, Man, and Cybernetics, 27(2):261-269.

27
Priebe, C. E. (1994).
Adaptive mixture density estimation.
Journal of the American Statistical Association, 89:796-806.

28
Proctor, P. E. (2001).
The Practical Intrusion Detection Handbook.
Prentice-Hall, Englewood Cliffs, NJ.

29
Robinson, J. A., Liang, V. M., Chambers, J. A. M., and MacKenzie, C. L. (1998).
Computer user verification using login string keystroke dynamics.
IEEE Transactions on Systems, Man, and Cybernetics, 28(2):236-241.

30
Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A. F., Theus, M., and Vardi, Y. (2001).
Computer intrusion: Detecting masquerades.
Statistical Science, 16:58-74.

31
Song, D. X., Wagner, D., and Tian, X. (2001).
Timing analysis of keystrokes and timing attacks on SSH.
In Proceedings of the 10th USENIX Security Symposium.
http://www.usenix.org/publications/library/proceedings/sec01/song.html.

32
Stevens, W. R. (1994).
TCP/IP Illustrated, Volume 1: The Protocols.
Addison-Wesley, Reading.

33
Tan, K. M. C. and Maxion, R. A. (2002).
``why 6?'' defining the operational limits of stide, an anomaly-based intrusion detector.
In IEEE Symposium on Security and Privacy. IEEE Computer Society Press.

34
Wegman, E. J. and Davies, H. I. (1979).
Remarks on some recursive estimators of a probability density.
Annals of Statistics, 7:316-327.

35
Wegman, E. J. and Dorfman, A. (2001).
Visualizing cereal world.
Technical Report TR 178, George Mason University, Center for Computational Statistics.

36
Wegman, E. J. and Marchette, D. J. (2003).
On some techniques for streaming data: a case study of Internet packet headers.
JCGS, 12(4):893-914.

37
Wierman, J. C. and Marchette, D. J. (2004).
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.
Computational Statistics and Data Analysis, 45(1):3-23.

38
Wilhelm, A. F. X., Wegman, E. J., and Symanzik, J. (1999).
Visual clustering and classification: The oronsay particle size data set revisited.
Computational Statistics, pages 109-146.

39
Yamato, H. (1971).
Sequential estimation of a continuous probability density function and the mode.
Bulletin of Mathematical Statistics, 14:1-12.