next up previous contents
Next: About this document Up: Seguridad en sistemas UNIX Previous: Técnicas de IA

References

AFV95
Debra Anderson, Thane Frivold, and Alfonso Valdes. Next-generation intrusion detection system (NIDES). Technical report, SRI International, Mayo 1995. A Summary.

Ams88
Ellen Amsel. Network security and access control. Network Access Special Interest Group, ISSA, 1988.

CHS91
Peter Cheesman, Robin Hanson, and John Stutz. Bayesian classification with correlation and inheritance. In 12th International Conference on Artificial Intelligence, Agosto 1991.

Cur90
David A. Curry. Improving the security of your UNIX system. Technical report, Programer Information and Telecomunication Sciences and Technology Division SRI International, 1990.

Dep85
Departmant of Defense Standard. Departmen of defense trusted computer. System evaluation criteria (Orange Book), Diciembre 1985.

Fra94
Jeremy Frank. Artificial inteligence and intruson detection: Current and future directions. Technical report, Division of Computer Science. University of California at Davis, 1994.

FS95
Daniel Farmer and Eugene H. Spafford. The COPS security checker system. Technical report, Computer Emergenci Response Team, Carnegie Mellon University. Department of Computer Science, Purdue University, 1995.

FV86
Dan Farner and Wietse Venema. Improving the security of your site by breaking into it. Technical report, Sun Microsystems, Eeindhoven University of Technology, 1986.

HLMS90
R. Heady, G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Technical report, Department of Computer Science, University of New Mexico, Agosto 1990.

HSP91
David K. Hess, David R. Spafford, and Udo W. Pooch. A UNIX network protocol security study: Network information service. Technical report, Texas A&M University, 1991.

IEE90
IEEE. A Computational Model for the Data Compresion Metaphor, Symposium on Reserach in Computer Security and Privacy, 1990.

Ilg92
Koral Ilgun. USTAT: A real-time imtrusion detection system for UNIX. Masterś thesis, Computer Science Department, University of California Santa Barbara, 1992.

KS94
Sandeep Kumar and Eugene H. Spafford. An application of pattern matching in intrusion detection. Technical report, The COAST project. Department of Computer Sciences. University of California, Davis, 1994.

MHL94
Biswanath Mukherjee, L. Todd Heberlein, and Karl N. Levit. Network intrusion detection. IEEE Network, Mayo/Junio 1994.

Nat94
National Institute of Standards and Technology. U.S. Department of Commerce. An introdution to Computer Security: The NIST Handbook, 1994.

Ran94
Markus J. Ranum. Thinking about firewalls. Technical report, Trusted Information Systems Inc., 1994.

Rit79
Dennis Ritchie. On the security of UNIX. Technical report, AT&T Bell Laboratories, 1979.

Sch93
Schubar. Weackness in the DNS, the domain name service. Technical report, Purdue University, 1993.

Sma88
Stephen E. Smaha. Haystack: An intrusion detection system. In In Fourth Aerospace Computer Security Applications Conference, pages 37--44, 1988.

SS92
Steven R. Snapp and Stephen E. Smaha. Signature analysis model definition and formalism, Agosto 1992.

Sta94
William Stallings. SNMP, SNMPv2 and CMIP. The Practical Guide to Network-Management Standards. Addison-Wesley Publishing Company, fourth edition, Abril 1994.

Sun88
Sun Microsystems. SunOS Reference Manual, part number 800-1751-10 edition, Mayo 1988.

Sun90a
Sun Microsystems. Administering Security, revision A of 27 march edition, 1990.

Sun90b
Sun Microsystems. System Network Administration, revision A of 27 march edition, 1990.

TCL90
Henry S. Teng, Kaihu Chen, and Stephen C Lu. Analysis using inductively generated predicted rules. Technical report, Piscataway, New jersey, Marzo 1990.

Tom94
Chris Tomlinson. Solaris security: A practical guide. Technical report, Sun Microsystems, 1994.


Celestino Gomez Cid (adm)
Fri Mar 22 16:20:52 MET 1996