• Publications
  • Influence
DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype
TLDR
We are designing a Distributed Intrusion Detection System (DIDS) that combines distributed monitoring and data reduction (through individual host and LAN monitors) with centralized data analysis (through the DIDS director) to monitor a heterogeneous network of computers. Expand
  • 465
  • 24
  • PDF
A network security monitor
TLDR
This study concentrates on the security-related issues in a single broadcast LAN (local area network) such as Ethernet. Expand
  • 450
  • 23
  • PDF
DEMIDS: A Misuse Detection System for Database Systems
TLDR
We show that existing security models for misuse detection in database systems are insufficient to prevent misuse, especially insider abuse by legitimate users. Expand
  • 218
  • 17
  • PDF
A general cooperative intrusion detection architecture for MANETs
TLDR
We present a cooperative, distributed intrusion detection architecture that addresses these challenges while facilitating accurate detection of MANET-specific and conventional attacks. Expand
  • 184
  • 17
  • PDF
A specification-based intrusion detection system for AODV
TLDR
The Ad hoc On-Demand Distance Vector (AODV) routing protocol, designed for mobile ad hoc networks, offers quick adaptation to dynamic link conditions, low processing and memory overhead, and low network utilization. Expand
  • 295
  • 16
  • PDF
SELECT—a formal system for testing and debugging programs by symbolic execution
TLDR
SELECT is an experimental system for assisting in the formal systematic debugging of programs. Expand
  • 335
  • 15
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
TLDR
A first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC. Expand
  • 176
  • 15
  • PDF
Using Specification-Based Intrusion Detection for Automated Response
TLDR
Automated response to intrusions is an exciting area of research in intrusion detection, and we propose a structured approach to the problem. Expand
  • 144
  • 15
  • PDF
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
TLDR
We describe a specification-based approach to detect exploitations of vulnerabilities in security-critical programs. Expand
  • 420
  • 12
  • PDF
GrIDS A Graph-Based Intrusion Detection System for Large Networks
TLDR
We present the design of GrIDS (Graph-Based Intrusion Detection System). Expand
  • 409
  • 11
  • PDF