[1] W. Metcalf, V. Julien, D. Remien and N. Rogness, “Snort Inline,” http://sourceforge.net/projects/snort-inline/.
[2] Symantec Corp., “Norton Antivirus,” at http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nav2007.
[3] T. Ryutov, C. Neuman, K. Dongho, and Z. Li, “Integrated Access Control and Intrusion Detection for Web Servers,” Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), Providence, RI, 2003, pp. 394–401.
[4] McAfee Inc., “Internet Security Suite,” at http://us.mcafee.com/root/package.asp?pkgid=272.
[5] I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, “Using Specification-Based Intrusion Detection for Automated Response,” Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, 2003, pp. 136–154.
[6] S. M. Lewandowski, D. J. Van Hook, G. C. O’Leary, J. W. Haines, and L. M. Rossey, “SARA: Survivable Autonomic Response Architecture,” Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX), Anaheim, CA, 2001, vol. 1, pp. 77–88.
[7] G. B. White, E. A. Fisch, and U. W. Pooch, “Cooperating Security Managers: A Peer-Based Intrusion Detection System,” Network, IEEE 10 (1996): 20–23.
[8] P. G. Neumann and P. A. Porras, “Experience with EMERALD to Date,” Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, 1999, pp. 73–80.
[9] D. Ragsdale, C. Carver, J. Humphries, and U. Pooch, “Adaptation Techniques for Intrusion Detection and Intrusion Response Systems,” Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN, 2000, pp. 2344–2349.
[10] T. Toth and C. Kruegel, “Evaluating the Impact of Automated Intrusion Response Mechanisms,” Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, 2002, pp. 301–310.
[11] M. Atighetchi, P. Pal, F. Webber, R. Schantz, C. Jones, and J. Loyall, “Adaptive Cyber Defense for Survival and Intrusion Tolerance,” Internet Computing, IEEE 8 (2004): 25–33.
[12] M. Tylutki, “Optimal Intrusion Recovery and Response Through Resource and Attack Modeling,” Ph.D. Thesis, University of California at Davis, 2003.
[13] W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok, “Toward Cost-Sensitive Modeling for Intrusion Detection and Response,” Journal of Computer Security 10 (2002): 5–22.
[14] D. Wang, B. B. Madan, and K. S. Trivedi, “Security Analysis of SITAR Intrusion Tolerance System,” Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, Fairfax, VA, 2003, pp. 23–32.
[15] C. Cachin, “Distributing Trust on the Internet,” Proceedings of the International Conference on Dependable Systems and Networks (DSN), Göteborg, Sweden, 2001, pp. 183–192.
[16] P. Pal, F. Webber, and R. Schantz, “Survival by Defense-Enabling,” Foundations of Intrusion Tolerant Systems (Organically Assured and Survivable Information Systems), Jaynarayan H. Lala, ed., IEEE Computer Society, Los Alamitos, CA, 2003, pp. 261–269.
[17] F. B. Schneider and L. Zhou, “Implementing Trustworthy Services Using Replicated State Machines,” Security & Privacy Magazine, IEEE 3 (2005): 34–43.
[18] M. A. Hiltunen, R. D. Schlichting, and C. A. Ugarte, “Building Survivable Services Using Redundancy and Adaptation,” IEEE Transactions on Computers 52 (2003): 181–194.
[19] D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg, H. Holliday, and T. Reid, “Autonomic Response to Distributed Denial of Service Attacks,” Proceedings of the 4th International Symposium on Rapid Advances in Intrusion Detection (RAID), Davis, CA, 2001, pp. 134–149.
[20] C. Douligeris and A. Mitrokotsa, “DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art,” Computer Networks 44 (2004): 643–666.
[21] G. Koutepas, F. Stamatelopoulos, and B. Maglaris, “Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks,” Journal of Network and Systems Management 12 (2004): 73–94.
[22] University of Southern California, Information Sciences Institute, “Generic Authorization and Access-control API (GAA-API),” at http://gost.isi.edu/info/gaaapi/.
[23] Netfilter Core Team, “Libipq—Iptables Userspace Packet Queuing Library,” at http://www.cs.princeton.edu/~nakao/libipq.htm.
[24] McAfee Inc., “Network Intrusion Prevention,” at http://www.mcafee.com/us/smb/products/network_intrusion_prevention/index.html.
[25] McAfee Inc., “McAfee Host Intrusion Prevention,” at http://www.mcafee.com/us/local_content/datasheets/partners/ds_hips.pdf.
[26] B. Foo, Y. S. Wu, Y. C. Mao, S. Bagchi, and E. Spafford, “ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-commerce Environment,” Proceedings of the International Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, 2005, pp. 508–517.
[27] Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, and Eugene H. Spafford, “Automated Adaptive Intrusion Containment in Systems of Interacting Services,” Elsevier Computer Networks Journal, Special Issue on “From intrusion detection to self-protection”, vol. 51, Issue 5, pp. 1334–1360, April 2007.
[28] D. Armstrong, S. Carter, G. Frazier, and T. Frazier, “Autonomic Defense: Thwarting Automated Attacks via Real-Time Feedback control,” Wiley Complexity 9 (2003): 41–48.
[29] D. Armstrong, G. Frazier, S. Carter, T. Frazier, and I. Alphatech, “A Controller-Based Autonomic Defense System,” Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, 2003, vol. 2, pp. 21–23.
[30] O. P. Kreidl and T. M. Frazier, “Feedback Control Applied to Survivability: A Host-Based Autonomic Defense System,” IEEE Transactions on Reliability 53 (2004): 148–166.
[31] P. A. Porras and P. G. Neumann, “EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances,” Proceedings of the National Information Systems Security Conference, Baltimore, MD, 1997, pp. 353–365.
[32] P. Porras, D. Schnackenberg, S. Staniford-Chen, M. Stillman, and F. Wu, “The Common Intrusion Detection Framework,” CIDF working group document, at http://www.gidos.org.
[33] M. Petkac and L. Badger, “Security Agility in Response to Intrusion Detection,” Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, 2000, pp. 11–20.
[34] P. P. Pal, F. Webber, R. E. Schantz, and J. P. Loyall, “Intrusion Tolerant Systems,” Proceedings of the IEEE Information Survivability Workshop (ISW-2000), Boston, MA, 2000, pp. 24–26.
[35] V. Stavridou, B. Dutertre, R. A. Riemenschneider, and H. Saidi, “Intrusion Tolerant Software Architectures,” Proceedings of the 2001 DARPA Information Survivability Conference & Exposition, 2001. pp. 230–241
[36] S. M. Khattab, C. Sangpachatanaruk, D. Mosse, R. Melhem, and T. Znati, “Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks,” Proceedings of the the 24th International Conference on Distributed Computing Systems (ICDCS), 2004, pp. 328–337.
[37] W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, and R. M. Jokerst, “Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies,” Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), 2003, vol. 1, pp. 26–36.
[38] D. K. Y. Yau, J. C. S. Lui, L. Feng, and Y. Yeung, “Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles,” IEEE/ACM Transactions on Networking 13 (2005): 29–42.
[39] D. Schnackenberg, K. Djahandari, and D. Sterne, “Infrastructure for Intrusion Detection and Response,” Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), 2000, vol. 2, pp. 3–11.
[40] Carnegie Mellon University, Software Engineering Institute, “Survivable Network Technology,” at http://www.sei.cmu.edu/organization/programs/nss/surv-net-tech.html.
[41] R. J. Ellison, R. C. Linger, T. Longstaff, and N. R. Mead, “Survivable Network System Analysis: A Case Study,” IEEE Software, vol. 16. no. 4, pp. 70–77, Jul/Aug. 1999.
[42] S. Jha, J. Wing, R. Linger, and T. Longstaff, “Survivability Analysis of Network Specifications,” Proceedings of International Conference on Dependable Systems and Networks (DSN), New York, NY, 2000, pp. 613–622.
[43] J. R. Horgan, S. London, and M. R. Lyu, “Achieving Software Quality with Testing Coverage Measures,” Computer 27 (1994): 60–69.
[44] Devellion Limited, “CubeCart: PHP and MySQL Shopping Cart,” at http://www.cubecart.com/.
[45] V. Srinivasan, G. Varghese, and S. Suri, “Packet Classification Using Tuple Space Search,” in Proc. ACM SIGCOMM, Sept. 1999, pp. 135–146.
[46] M. Waldvogel, G. Varghese, J. Turner, and B. Plattner, “Scalable High Speed IP Routing Lookups,” in Proc. ACM SIGCOMM, Sept. 1997, pp. 25–36.
[47] P. Gupta and N. McKeown, “Algorithms for Packet Classification,” IEEE Network, vol. 15, no. 2, pp. 24–32, 2001.
[48] P. Gupta and N. McKeown, “Packet Classification Using Hierarchical Intelligent Cuttings,” Hot Interconnects VII, Aug. 1999.
[49] P. Gupta, S. Lin, and N. McKeown, “Routing Lookups in Hardware at Memory Access Speeds,” Proc. IEEE INFOCOM, pp. 1240–1247, Mar. 1999.