
J. McDermott and D. Goldschlag. Towards a model of
storage jamming. In Proceedings of the IEEE
Computer Security Foundations
Workshop, pages 176–185, Kenmare, Ireland, June 1996.
B. Mukherjee, L. T. Heberlein, and K.N. Levitt. Network
intrusion detection. IEEE Network, pages 26–41, June
1994.
P.A. Porras and R.A. Kemmerer. Penetration state
transition analysis: A rule-based intrusion detection
approach. In Proceedings of the 8th Annual Computer
Security Applications Conference, San Antonio,
Texas, December 1992.
F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of
authorization for next generation database systems.
ACM Transactions on Database Systems, 16(1):88–
131, 1994.
P. Liu S. Ingsriswang. Aaid: An application aware
transaction level database intrusion detection system.
Technical report, Department of Information Systems,
UMBC, Baltimore, MD, 2001.
D. Samfat and R. Molva. Idamn: An intrusion detection
architecture for mobile networks. IEEE Journal of
Selected Areas in Communications, 15(7):1373–1380,
1997.
R. Sandhu and F. Chen. The multilevel relational (mlr)
data model. ACM Transactions on Information and
Systems Security, 1(1), 1998.
S.-P. Shieh and V.D. Gligor. On a pattern-oriented model
for intrusion detection. IEEE Transactions on
Knowledge and Data Engi-neering, 9(4):661–667,
1997.
M. Winslett, K. Smith, and X. Qian. Formal query
languages for secure relational databases. ACM
Transactions on Database Systems, 19(4):626–662,
1994.
P. A. Porras and R. A. Kemmerer. Penetration state
transitionanalysis: A rule-based intrusion detection
approach. In Proceedings of the Eighth Annual
Computer Security Ap-plications Conference, pages
220–229, San Antonio, Texas, Nov. 30–Dec. 4, 1992.
P. Proctor. Audit reduction and misuse detection in
heterogeneous environments: Framework and
application. In Proceedings of the Tenth Annual
Computer Security Applications Conference, pages
117–125, Orlando, Florida, Dec. 5–9, 1994.
M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A.
Whitehurst. Expert systems in intrusion detection: A
case study. In Proceedings of the 11th National
Computer Security Conference, pages 74–81,
Baltimore, Maryland, Oct. 17–20, 1988. National
Institute of Standards and Technology/National
Computer Security Center.
J. Habra, B. Le Charlier, A. Mounji, and I. Mathieu.
ASAX: Software architecture and rule-based language
for universal audit trail analysis. In Y. Deswarte et al.,
editors, Computer Security – Proceedings of
ESORICS 92, volume 648 of LNCS, pages 435–450,
Toulouse, France, Nov. 23–25, 1992. Springer-Verlag.
L. T. Heberlein et al. A network security monitor. In
Proceedings of the 1990 IEEE Symposium on Security
and Pri-vacy, pages 296–304, Oakland, California,
May 7–9, 1990.
K. Ilgun. USTAT: A real-time intrusion detection system
for UNIX. In Proceedings of the 1993 IEEE
Symposium on Security and Privacy, pages 16–28,
Oakland, California, May 24–26, 1993.
U. Lindqvist and P. A. Porras. Detecting computer and
network misuse through the production-based expert
system toolset (P-BEST). In Proceedings of the 1999
IEEE Symposium on Security and Privacy, pages
146–161, Oakland, California, May 9–12, 1999.
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K.
Das. Analysis and results of the 1999 DARPA off-line
intrusion detection evaluation. In H. Debar, L. M´ e,
and S. F. Wu, editors, Recent Advances in Intrusion
Detection (RAID 2000), volume 1907 of LNCS, pages
162–182, Toulouse, France, Oct. 2–4, 2000. Springer-
Verlag.
A. Mounji. Languages and Tools for Rule-Based
Distributed Intrusion Detection. PhD thesis, Institut
d’Informatique, University of Namur, Belgium, Sept.
1997.
P. G. Neumann and P. A. Porras. Experience with
EMERALD to date. In Proceedings of the 1st
Workshop on Intrusion Detection and Network
Monitoring, Santa Clara, California, Apr. 9–12, 1999.
The USENIX Association.
A. One. Smashing the stack for fun and profit. Phrack
Magazine, 7(49), Nov. 8, 1996.
http://www.fc.net/phrack/files/ p49/p49-14.
J. Picciotto. The design of an effective auditing subsystem.
In Proceedings of the 1987 IEEE Symposium on
Security and Privacy, pages 13–22, Oakland,
California, Apr. 27–29, 1987.
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
280