[1] W. Metcalf, V. Julien, D. Remien and N. Rogness, “Snort Inline,” http://sourceforge.net/projects/snort-inline/.

[2] Symantec Corp., “Norton Antivirus,” at http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nav2007.

[3] T. Ryutov, C. Neuman, K. Dongho, and Z. Li, “Integrated Access Control and Intrusion Detection for Web Servers,” Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), Providence, RI, 2003, pp. 394–401.

[4] McAfee Inc., “Internet Security Suite,” at http://us.mcafee.com/root/package.asp?pkgid=272.

[5] I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using Specification-Based Intrusion Detection for Automated Response,” Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, 2003, pp. 136–154.

[6] S. M. Lewandowski, D. J. Van Hook, G. C. O’Leary, J. W. Haines, and L. M. Rossey, “SARA: Survivable Autonomic Response Architecture,” Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX), Anaheim, CA, 2001, vol. 1, pp. 77–88.

[7] G. B. White, E. A. Fisch, and U. W. Pooch, “Cooperating Security Managers: A Peer-Based Intrusion Detection System,” Network, IEEE 10 (1996): 20–23.

[8] P. G. Neumann and P. A. Porras, “Experience with EMERALD to Date,” Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, 1999, pp. 73–80.

[9] D. Ragsdale, C. Carver, J. Humphries, and U. Pooch, “Adaptation Techniques for Intrusion Detection and Intrusion Response Systems,” Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN, 2000, pp. 2344–2349.

[10] T. Toth and C. Kruegel, “Evaluating the Impact of Automated Intrusion Response Mechanisms,” Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, 2002, pp. 301–310.

[11] M. Atighetchi, P. Pal, F. Webber, R. Schantz, C. Jones, and J. Loyall, “Adaptive Cyber Defense for Survival and Intrusion Tolerance,” Internet Computing, IEEE 8 (2004): 25–33.

[12] M. Tylutki, “Optimal Intrusion Recovery and Response Through Resource and Attack Modeling,” Ph.D. Thesis, University of California at Davis, 2003.

[13] W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok, “Toward Cost-Sensitive Modeling for Intrusion Detection and Response,” Journal of Computer Security 10 (2002): 5–22.

[14] D. Wang, B. B. Madan, and K. S. Trivedi, “Security Analysis of SITAR Intrusion Tolerance System,” Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, Fairfax, VA, 2003, pp. 23–32.

[15] C. Cachin, “Distributing Trust on the Internet,” Proceedings of the International Conference on Dependable Systems and Networks (DSN), Göteborg, Sweden, 2001, pp. 183–192.

[16] P. Pal, F. Webber, and R. Schantz, “Survival by Defense-Enabling,” Foundations of Intrusion Tolerant Systems (Organically Assured and Survivable Information Systems), Jaynarayan H. Lala, ed., IEEE Computer Society, Los Alamitos, CA, 2003, pp. 261–269.

[17] F. B. Schneider and L. Zhou, “Implementing Trustworthy Services Using Replicated State Machines,” Security & Privacy Magazine, IEEE 3 (2005): 34–43.

[18] M. A. Hiltunen, R. D. Schlichting, and C. A. Ugarte, “Building Survivable Services Using Redundancy and Adaptation,” IEEE Transactions on Computers 52 (2003): 181–194.

[19] D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg, H. Holliday, and T. Reid, “Autonomic Response to Distributed Denial of Service Attacks,” Proceedings of the 4th International Symposium on Rapid Advances in Intrusion Detection (RAID), Davis, CA, 2001, pp. 134–149.

[20] C. Douligeris and A. Mitrokotsa, “DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art,” Computer Networks 44 (2004): 643–666.

[21] G. Koutepas, F. Stamatelopoulos, and B. Maglaris, “Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks,” Journal of Network and Systems Management 12 (2004): 73–94.

[22] University of Southern California, Information Sciences Institute, “Generic Authorization and Access-control API (GAA-API),” at http://gost.isi.edu/info/gaaapi/.

[23] Netfilter Core Team, “Libipq—Iptables Userspace Packet Queuing Library,” at http://www.cs.princeton.edu/~nakao/libipq.htm.

[24] McAfee Inc., “Network Intrusion Prevention,” at http://www.mcafee.com/us/smb/products/network_intrusion_prevention/index.html.

[25] McAfee Inc., “McAfee Host Intrusion Prevention,” at http://www.mcafee.com/us/local_content/datasheets/partners/ds_hips.pdf.

[26] B. Foo, Y. S. Wu, Y. C. Mao, S. Bagchi, and E. Spafford, “ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-commerce Environment,” Proceedings of the International Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, 2005, pp. 508–517.

[27] Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, and Eugene H. Spafford, “Automated Adaptive Intrusion Containment in Systems of Interacting Services,” Elsevier Computer Networks Journal, Special Issue on “From intrusion detection to self-protection”, vol. 51, Issue 5, pp. 1334–1360, April 2007.

[28] D. Armstrong, S. Carter, G. Frazier, and T. Frazier, “Autonomic Defense: Thwarting Automated Attacks via Real-Time Feedback control,” Wiley Complexity 9 (2003): 41–48.

[29] D. Armstrong, G. Frazier, S. Carter, T. Frazier, and I. Alphatech, “A Controller-Based Autonomic Defense System,” Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, 2003, vol. 2, pp. 21–23.

[30] O. P. Kreidl and T. M. Frazier, “Feedback Control Applied to Survivability: A Host-Based Autonomic Defense System,” IEEE Transactions on Reliability 53 (2004): 148–166.

[31] P. A. Porras and P. G. Neumann, “EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances,” Proceedings of the National Information Systems Security Conference, Baltimore, MD, 1997, pp. 353–365.

[32] P. Porras, D. Schnackenberg, S. Staniford-Chen, M. Stillman, and F. Wu, “The Common Intrusion Detection Framework,” CIDF working group document, at http://www.gidos.org.

[33] M. Petkac and L. Badger, “Security Agility in Response to Intrusion Detection,” Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, 2000, pp. 11–20.

[34] P. P. Pal, F. Webber, R. E. Schantz, and J. P. Loyall, “Intrusion Tolerant Systems,” Proceedings of the IEEE Information Survivability Workshop (ISW-2000), Boston, MA, 2000, pp. 24–26.

[35] V. Stavridou, B. Dutertre, R. A. Riemenschneider, and H. Saidi, “Intrusion Tolerant Software Architectures,” Proceedings of the 2001 DARPA Information Survivability Conference & Exposition, 2001. pp. 230–241

[36] S. M. Khattab, C. Sangpachatanaruk, D. Mosse, R. Melhem, and T. Znati, “Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks,” Proceedings of the the 24th International Conference on Distributed Computing Systems (ICDCS), 2004, pp. 328–337.

[37] W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, and R. M. Jokerst, “Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies,” Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), 2003, vol. 1, pp. 26–36.

[38] D. K. Y. Yau, J. C. S. Lui, L. Feng, and Y. Yeung, “Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles,” IEEE/ACM Transactions on Networking 13 (2005): 29–42.

[39] D. Schnackenberg, K. Djahandari, and D. Sterne, “Infrastructure for Intrusion Detection and Response,” Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), 2000, vol. 2, pp. 3–11.

[40] Carnegie Mellon University, Software Engineering Institute, “Survivable Network Technology,” at http://www.sei.cmu.edu/organization/programs/nss/surv-net-tech.html.

[41] R. J. Ellison, R. C. Linger, T. Longstaff, and N. R. Mead, “Survivable Network System Analysis: A Case Study,” IEEE Software, vol. 16. no. 4, pp. 70–77, Jul/Aug. 1999.

[42] S. Jha, J. Wing, R. Linger, and T. Longstaff, “Survivability Analysis of Network Specifications,” Proceedings of International Conference on Dependable Systems and Networks (DSN), New York, NY, 2000, pp. 613–622.

[43] J. R. Horgan, S. London, and M. R. Lyu, “Achieving Software Quality with Testing Coverage Measures,” Computer 27 (1994): 60–69.

[44] Devellion Limited, “CubeCart: PHP and MySQL Shopping Cart,” at http://www.cubecart.com/.

[45] V. Srinivasan, G. Varghese, and S. Suri, “Packet Classification Using Tuple Space Search,” in Proc. ACM SIGCOMM, Sept. 1999, pp. 135–146.

[46] M. Waldvogel, G. Varghese, J. Turner, and B. Plattner, “Scalable High Speed IP Routing Lookups,” in Proc. ACM SIGCOMM, Sept. 1997, pp. 25–36.

[47] P. Gupta and N. McKeown, “Algorithms for Packet Classification,” IEEE Network, vol. 15, no. 2, pp. 24–32, 2001.

[48] P. Gupta and N. McKeown, “Packet Classification Using Hierarchical Intelligent Cuttings,” Hot Interconnects VII, Aug. 1999.

[49] P. Gupta, S. Lin, and N. McKeown, “Routing Lookups in Hardware at Memory Access Speeds,” Proc. IEEE INFOCOM, pp. 1240–1247, Mar. 1999.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset