NetSTAT: A Network-Based Intrusion Detection Approach

@inproceedings{Vigna1998NetSTATAN,
  title={NetSTAT: A Network-Based Intrusion Detection Approach},
  author={Giovanni Vigna and Richard A. Kemmerer},
  booktitle={ACSAC},
  year={1998}
}
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to the network itself. Network-based intrusion detection is challenging because network auditing produces large amounts of data, and different events related to a single intrusion may be visible in different places on the network. This paper presents NetSTAT, a new approach to network intrusion detection. By using a… CONTINUE READING
Highly Influential
This paper has highly influenced 11 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 275 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 163 extracted citations

Specification-Based Testing of Intrusion Detection Engines Using Logical Expression Testing Criteria

2010 10th International Conference on Quality Software • 2010
View 9 Excerpts
Highly Influenced

Statistical Intrusion Detection in Data Networks

IEEE Latin America Transactions • 2007
View 3 Excerpts
Highly Influenced

VoIP Intrusion Detection Through Interacting Protocol State Machines

International Conference on Dependable Systems and Networks (DSN'06) • 2006
View 5 Excerpts
Highly Influenced

Architecture for an Artificial Immune System

Evolutionary Computation • 2000
View 4 Excerpts
Highly Influenced

275 Citations

01020'99'03'08'13'18
Citations per Year
Semantic Scholar estimates that this publication has 275 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

and V

S. McCanne, C. Leres
Jacobson. Tcpdump 3.4. Documentation • 1998
View 1 Excerpt

State Transition Analysis: A Rule-Based Intrusion Detection System

K. Iglun, R. A. Kemmerer, P. A. Porras
IEEE Transactions on Software Engineering, • 1995
View 2 Excerpts

STAT – A State Transition Analysis Tool for Intrusion Detection

P. Porras
Master’s thesis, Computer Science Department, • 1992
View 1 Excerpt

The SRI IDES Statistical Anomaly Detector

IEEE Symposium on Security and Privacy • 1991
View 1 Excerpt

A Network Security Monitor

IEEE Symposium on Security and Privacy • 1990
View 1 Excerpt

A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks

J. Winkler
In Proceedings of the National Computer Security Conference, • 1990
View 1 Excerpt

Similar Papers

Loading similar papers…