1999
DOI: 10.1145/306549.306577
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection for distributed applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2000
2000
2006
2006

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 44 publications
(28 citation statements)
references
References 4 publications
0
28
0
Order By: Relevance
“…They also showed that this method could detect a wide variety of security attacks with few false alarms in production environments. This work has inspired many other researchers [5,6,7,8], and has served as the basis for Sana Security, multi-million dollar Bay Area start-up company founded by Steven Hofmeyr, a former student of Forrest.…”
Section: Introduction: Computer Immunologymentioning
confidence: 95%
See 1 more Smart Citation
“…They also showed that this method could detect a wide variety of security attacks with few false alarms in production environments. This work has inspired many other researchers [5,6,7,8], and has served as the basis for Sana Security, multi-million dollar Bay Area start-up company founded by Steven Hofmeyr, a former student of Forrest.…”
Section: Introduction: Computer Immunologymentioning
confidence: 95%
“…The least significant (rightmost) bit is set if the first call ever occurred immediately prior to the second call, while the next bit is set if the first call ever occurred 2 calls prior to the second call, and so on. For example, [8] …”
Section: Appendix C: Robot Software Detailsmentioning
confidence: 99%
“…Our major results are described in Section 1. Briefly, we • showed that the computational immunology approach reliably detects attacks on the Domain Name Server that seriously disrupt Internet service; • analyzed the components required for a definition of self that is applicable to computer programs and reported the analysis in Communications of the ACM [15]; • conducted experiments that show that a straightforward definition of self can detect rogue client attacks on CORBA systems; • built a prototype system to aid in the analysis of experimental data and generate descriptions of normal application behavior; • built a prototype intrusion detection system for CORBA that can be used with a broad class of definitions of self; and • participated in a successful demonstration of intrusion detection systems communicating by means of the Common Intrusion Detection Framework (CIDF) protocol [14].…”
Section: Table Of Contentsmentioning
confidence: 99%
“…What constitutes a definition of self in general, and for distributed applications in particular? This work, summarized in Section 3.1, was published in Communications of the ACM [15].…”
Section: Research At Ora: Applying Computational Immunology To Distrimentioning
confidence: 99%
See 1 more Smart Citation