• Non ci sono risultati.

[3] V. D.Gligor, “A Note on the Denial-of-Service Problem”, Proceedings of the IEEE Symposium on Security and Privacy, pag. 139 –149 (1983)

N/A
N/A
Protected

Academic year: 2021

Condividi "[3] V. D.Gligor, “A Note on the Denial-of-Service Problem”, Proceedings of the IEEE Symposium on Security and Privacy, pag. 139 –149 (1983) "

Copied!
10
0
0

Testo completo

(1)

BIBLIOGRAFIA

[1] J. P. Anderson, “Computer Security Threat Monitoring and Surveillance”, technical report, James P. Anderson Company, Fort Washington, Pennsylvania (Aprile 1980)

[2] Department of Defense, National Computer Security Center, “Trusted Computer System Evaluation Criteria”, (Dicembre 1985)

[3] V. D.Gligor, “A Note on the Denial-of-Service Problem”, Proceedings of the IEEE Symposium on Security and Privacy, pag. 139 –149 (1983)

[4] E. G. Amoroso, “Fundamentals of Computer Security Technology”, Prentice- Hall PTR (1994)

[5] D.E. Bell, L.J. LaPadula, "Secure Computer Systems: Unified Exposition and Multics Interpretation", technical report, Mitre TR-2997, Mitre Corporation, Bedford, MA (Marzo 1976)

[6] D. B. Baker, “Fortresses Built Upon Sand”, in New Security Paradigms Workshop, pag. 148 –153 (Settembre 1996)

[7] O. Dahl, E. Dijkstra, C.A. Hoare, “Structured Programming”, Academic Press, London and New York (1972)

[8] B.P. Miller, L. Fredrikson, B. So, “An empirical study of the reliability of

UNIX utilities”, Communications of the ACM, 33(12):32-44 (Dicembre

1990)

(2)

[9] P.G. Neumann, L. Robinson, K.N. Levitt, R.S. Boyer, A.R. Saxena, “A Provably Secure Operating System”, Technical Report SRI Project 2581, Stanford Research Institute (Giugno 1975)

[10] J.R. Williams, M. Schaefer, D.J. Landoll, “Pretty Good Assurance”, New Security Paradigms Workshop, pag. 82 –89, Arca Systems (Settembre 1996)

[11] http://online.securityfocus.com/sfonline/vulns/stats.shtml

[12] http://www.cert.org/stats/cert_stats.html

[13] B. Schneier, “Full Disclosure and the Window of Exposure”, CryptoGram newsletter, n. 9 (15 settembre 2000)

http://www.schneier.com/crypto-gram-0009.html

[14] “Human Firewall” su http://www.humanfirewall.org

[15] Computer Security Institute – Federal Bureau of Investigations, “The 2002 CSI/FBI computer crime and security survey”, disponibile online http://www.gocsi.com/press/20020407.html

[16] T. Shimomura, J. Markoff, “Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It”, Hyperion, New York (1996)

[17] S. Garfinkel, G. Spafford, “Web Security &Commerce”, O’Reilly

(1997)

(3)

[18] D. L. Lough, “A taxonomy of computer attacks with applications to wireless networks”, tesi di dottorato, Virginia Polytechnic Institute and State University, (Aprile 2001)

[19] J. D. Howard, “An Analysis Of Security Incidents On The Internet, 1989 – 1995”, tesi di dottorato, università di Pittsburgh (7 aprile 1997)

http://www.cert.org/research/JHThesis/Start.html

[20] Sun Tzu, “L’arte della guerra”, SuperBUR Classici, RCS Milano (Aprile 1999)

[21] M. Strano, “Computer crime”, edizioni Apogeo, Milano (2000)

[22] D. A. Wheeler, “Secure Programming for Linux and Unix HOWTO”

http://www.dwheeler.com/secure-programs

[23] E. “Aleph1” Levy, “Smashing the stack for fun and profit”, Phrack magazine, vol. 7, issue 49 (Novembre 1996)

http://www.phrack.org/phrack/49/P49-14

[24] http://www.sans.org/top20

[25] http://www.us-cert.gov/cas/techalerts/TA04-111A.html

[26] E. H. Spafford, K. A. Heaphy, D. J. Ferbrache, "A Computer Virus

Primer", in “Computers Under Attack: Intruders, Worms, and Viruses”,

Peter J. Denning, ed., pp. 316-355, ACM Press, New York (1990)

(4)

[27] http://project.honeynet.org/

[28] A. Ghirardini, “Social Engineering: una guida introduttiva”, technical white paper #3, Italian Black Hats Association

http://www.blackhats.it/it/papers/social_engineering.pdf

[29] B. Mukherjee, L.T. Heberlein, K.N. Levitt, “Network Intrusion Detection”, IEEE Network, Maggio/Giugno 1994

[30] S. Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy”, Technical Report 99-15, Depart. of Computer Engineering, Chalmers University (Marzo 2000)

[31] The Honeynet Project,“Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community”, Addison-Wesley (Agosto 2001)

[32] NEPED (Network Promiscuous Ethernet Detector) del gruppo di hacking spagnolo Apostols, http://www.apostols.org, successivamente migliorato dal gruppo italiano s0ftpj in PROscan:

http://www.s0ftpj.org/tools/proscan.c

[33] L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D.

Wolber, “A Network Security Monitor”, Proceedings of the IEEE Symposium on Research in Security and Privacy, pag. 296-304 (Maggio 1990)

http://seclab.cs.ucdavis.edu/papers/pdfs/th-gd-90.pdf

(5)

[34] T. Bass, “Intrusion detection systems & multisensor data fusion:

Creating cyberspace situational awareness” , Communications of the ACM, Aprile 2000

[35] S.R. Snapp, J. Brentano, G.V. Dias, T.L. Goan, T. Grance, L.T.

Heberlein, Che-Lin Ho, K.N. Levitt, B. Mukherjee, D.L. Mansur, K.L. Pon, S.E. Smaha “A system for distributed intrusion detection”, COMPCOM Spring '91 Digest of Papers, pag. 170-176 (Febbraio/Marzo 1991)

[36] J.S. Balasubramaniyan, J.O. Garcia-Fernandez, D. Isaco, E.H. Spafford, D. Zamboni, “An Architecture for Intrusion Detection Using Autonomous Agents”, Proceedings of ACSAC '98, pag. 13-24 (1998)

[37] http://www.intrusion.com/products/securenet/

[38] http://www.sikurezza.org/angel/

[39] V. Paxson, "Bro: A System for Detecting Network Intruders in Real- Time", 7

th

Annual USENIX Security Symposium (Gennaio 1998)

http://citeseer.nj.nec.com/article/paxson98bro.html

[40] http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz

[41] T. H. Ptacek, T. N. Newsham, “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, Technical Report, Secure Networks (Gennaio 1998)

http://citeseer.nj.nec.com/ptacek98insertion.html

(6)

[42] http://www.cse.sc.edu/research/isl/mirrorSobireys.shtml

[43] T. F. Lunt, R. Jagannathan, R. Lee, S. Listgarten, D. L. Edwards, H. S.

Javitz, A. Valdes, “IDES: The Enhanced Prototype - A Real-Time Intrusion- Detection Expert System”, technical report SRI-CSL-88-12, SRI International, Menlo Park, CA (Ottobre 1988)

http://www.sdl.sri.com/papers/csl-88-12/

[44] J. R. Winkler, “A UNIX Prototype for Intrusion and Anomaly Detection in Secure Networks”, Proceedings of the 13th National Computer Security Conference, pag. 115-124 Washington D. C. (Ottobre 1990)

[45] M. M. Sebring, E. Sellhouse, M. E. Hanna, R. A. Whitehurst, “Expert system in intrusion detection: A case study”, Proceedings of the 11th National Computer Security Conference, pag. 74-81, Baltimora (Ottobre 1988)

[46] H. S.Vaccaro, G. E. Liepins, “Detection of anomalous computer session activity”, Proceedings of the Symposium on Research in Security and Privacy, Oakland, pag. 280-289 (Maggio 1989)

[47] M. Roesch, “Snort —Lightweight intrusion detection for networks”, Proceedings of LISA '99 13th USENIX Systems Administration Conference, Seattle (Novembre 1999)

[48] http://www.ethereal.com

(7)

[49] C. Kruegel, T. Toth, “Automatic rule clustering for improved signature- based intrusion detection”, Technical Report

http://www.infosys.tuwien.ac.at/snort-ng/snort-ng.pdf

[50] http://www.insecure.org/nmap

[51]

http://www.bindview.com/Support/RAZOR/Utilities/Unix_Linux/icmpenum _readme.cfm

[52] S. Staniford, J. Hoagland, and J. McAlerney, Practical Automated Detection of Stealthy Portscans. Journal of Computer Security, 2002

[53]

http://www.managementsoftware.hp.com/products/ecs/prod_ecs_0001.html

[54] http://www.open.com/products/nervecenter.jsp

[55] http://kodu.neti.ee/~risto/sec

[56] H. Mannila, H. Toivonen, and A. I. Verkamo, “Discovery of frequent episodes in event sequences”, Data Mining and Knowledge Discovery, Vol.

1(3), 1997.

[57] M. Klemettinen, H. Mannila, and H. Toivonen, “Rule Discovery in

Telecommunication Alarm Data”, Journal of Network and Systems

Management, Vol. 7(4), 1999.

(8)

[58] Qingguo Zheng, Ke Xu, Weifeng Lv, and Shilong Ma, “Intelligent Search of Correlated Alarms from Database Containing Noise Data”, Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium, 2002.

[59] L. Burns, J. L. Hellerstein, S. Ma, C. S. Perng, D. A. Rabenhorst, and D. Taylor, “A Systematic Approach to Discovering Correlation Rules For Event Management”, Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management, 2001.

[60] Sheng Ma and Joseph L. Hellerstein, “Mining Partially Periodic Event Patterns with Unknown Periods”, Proceedings of the 16th International Conference on Data Engineering, 2000.

[61] C. Lonvick, “The BSD syslog Protocol”, RFC3164, 2001.

[62] David Hand, Heikki Mannila, and Padhraic Smyth, Principles of Data Mining, The MIT Press, 2001.

[63] Pavel Berkhin, “Survey of Clustering Data Mining Techniques”, unpublished (see http://citeseer.nj.nec.com/berkhin02survey.html, 2002

[64] Sudipto Guha, Rajeev Rastogi, and Kyuseok Shim, “ROCK: A Robust Clustering Algorithm for Categorical Attributes”, Information Systems, Vol.

25(5), 2000.

[65] Venkatesh Ganti, Johannes Gehrke, and Raghu Ramakrishnan,

“CACTUS – Clustering Categorical Data Using Summaries”, Proceedings of

(9)

the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999.

[66] Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, and Prabhakar Raghavan, “Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications”, Proceedings of the ACM SIGMOD International Conference on Management of Data, 1998.

[67] Charu C. Aggarwal, Cecilia Procopiuc, Joel L. Wolf, Philip S. Yu, and Jong Soo Park, “Fast Algorithms for Projected Clustering”, Proceedings of the ACM SIGMOD International Conference on Management of Data, 1999.

[68] Sanjay Goil, Harsha Nagesh, and Alok Choudhary, “MAFIA: Efficient and Scalable Subspace Clustering for Very Large Data Sets”, Technical Report No. CPDC-TR-9906-010, Northwestern University, 1999.

[69] Rakesh Agrawal and Ramakrishnan Srikant, “Fast Algorithms for Mining Association Rules”, Proceedings of the 20th International Conference on Very Large Data Bases, 1994.

[70] Kaufman, L. & Rousseeuw, P. (1990) in Finding Groups in Data: An Introduction to Cluster Analysis (Wiley, New York),

[71] http://simple-evcorr.sourceforge.net/sec.pl.html

[72]

http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml

[73] http://www.iana.org/assignments/protocol-numbers

(10)

[74] http://www.iana.org/assignments/multicast-addresses

[75] http://www.iana.org/assignments/port-numbers

[76] http://www.isc.org/sw/bind

[77] http://www.kb.cert.org/vuls/id/327633

[78] http://www.kb.cert.org/vuls/id/938617

[79] http://www.emule-project.net/

Riferimenti

Documenti correlati

Example V.1. Figure 3 illustrates an example of a portfolio graph, obtained by extending the portfolio in Figure 1. For concreteness and simplicity, sensitivity labels are

Dillmann: Robot Programming by Demonstration (RPD) - Using Machine Learning and User Interac- tion Methods for the Development of Easy and Comfortable Robot Pro- gramming

Dr Tronchin is a member of the Scientific Committee of the CIARM, the Inter- University Centre of Acoustics and Musical research, has chaired sessions of architectural and musical

She received her MEng in Civil Engineering in 1982, a PhD degree in Structural Mechanics in 1987 from Voronezh Civil Engineering Institute, a DSc degree in Solid Mechanics in

ter Beek (Italy) Astrid Kiehn (India) Marco Bernardo (Italy) Eryk Kopczy´nski (Poland) Alberto Bertoni (Italy) Diego Latella (Italy) Alessandra Di Pierro (Italy) Jakub

Tree architecture can be controlled by pruning and using size-controlling rootstocks, but natural tree forms resulting in small and narrow trees could be desirable to assure a

It can be shown that, for a fixed photon path

Hannay, Effectiveness and Ineffectiveness of the UN Security Council in the Last Twenty Years: A European Perspective, paper produced in the framework of the