From: wetmore@toadflax.UCDavis.EDU (Brad)
Newsgroups: alt.security
Subject: bibliography of intrusion detection
Message-ID: <14446@ucdavis.ucdavis.edu>
Date: 12 Jun 92 21:49:27 GMT
Organization: UC Davis - Department of Computer Science

I know I'm gonna get flamed for this, but several people asked for a
brief bibliography of some of the works on intrusion detection
literature.  This list is nowhere near complete, I've chosen several
examples of papers I think are of some importance.  (I'm not going to
respond to mail like "Why wasn't article X included in your list.")
You are more than welcome to submit followups recommending other works,
maybe I'll learn something as well...

Although a little dated, I would recommend the Lunt Survey paper
first.

Cheers,
Brad

=======================================================================

James P. Anderson, "Computer Security Threat Monitoring and
Surveillance", James P. Anderson Co., Fort Washington, PA, April,
1980.

Dorothy E. Denning, "An Intrusion Detection Model", Proceedings
of the 1986 IEEE Symposium on Security and Privacy, April, 1986.

Thomas D. Garvey and T. Lunt, "Model-based Intrusion Detection",
Proceedings of the 14th National Computer Security Conference,
Washington, DC, October, 1991.

L. T. Heberlein, K. Levitt, and B. Mukherjee, "A Method to Detect
Intrusive Activity in a Networked Environment", Proceedings of the
14th National Computer Security Conference, Washington, DC,
October, 1991.

Harold S. Javitz and Al Valdez, "The SRI IDES Statistical Anomaly
Detector", Proceedings of the 1991 IEEE Symposium on Research in
Security and Privacy, Oakland, CA, May, 1991.

Teresa Lunt, "Automated Audit Trail Analysis and Intrusion
Detection:  A Survey", Proceedings of the 11th National Computer
Security Conference, October, 1988.

Teresa Lunt et al, "IDES: A Progress Report", Proceedings of the
Sixth Annual Computer Security Applications Conference, Tucson, AZ,
December, 1990.

National Computer Security Center, "A Guide to Understanding
Audit in Trusted Systems", NCSC-TG-001, Version 2, 1 June 1988.

National Computer Security Center, "DoD Trusted Computer System
Evaluation Criteria", DoD 5200.28-STD, December, 1985.

Michael M. Sebring, Eric Shellhouse, Mary E. Hanna, and R. Alan
Whitehurst, "Expert Systems in Intrusion Detection:  A Case
Study", Proceedings of the 11th National Computer Security
Conference, October, 1988.

Stephen E. Smaha, "Haystack:  An Intrusion Detection System",
proceedings of the IEEE Fourth Aerospace Computer Security
Applications Conference, Orlando, FL, December, 1988.

Steven R. Snapp, J. Brentano, G. Dias, T. Goan, T. Heberlein, C. Ho,
K. Levitt, B. Mukherjee, S. Smaha, T. Grance, D. Teal, and D. Mansur,
"DIDS (Distributed Intrusion Detection System) -  Motivation,
Architecture, and An Early Prototype", Proceedings of the
14th National Computer Security Conference, Washington, DC,
October, 1991.

Sytek, Inc., "Analysis of Computer System Audit Trails", Sytek
Technical Reports 85009, 85012, 85018, 86005, 86007, Mountain
View, CA, 1985-1986.

H.S. Vaccaro and G.E. Liepins, "Detection of Anomalous Computer
Session Activity", Proceedings of the 1989 IEEE Symposium on
Security and Privacy, May, 1989.

J.R. Winkler, "A UNIX Prototype for Intrusion and Anomaly
Detection in Secure Networks", Proceedings of the 13th National
Computer Security Conference, October, 1990.


   /
O /                         Steal here.
 X ----------------------------------------------------------------
O \     Brad Wetmore:                 wetmore@toadflax.cs.ucdavis.edu
   \    Help!!!  I've been robbed.  Someone stole my .sig, and sold 
	it back at the UCD used .sigstore.

