Publication Details
Title: Exploiting Independent State For Network Intrusion Detection
Author: R. Sommer and V. Paxson
Group: Networking
Date: December 2005
PDF: http://www.icsi.berkeley.edu/pubs/networking/state-acsac05.pdf
Acknowledgements:
This work was partially supported by funding provided to ICSI through National Science Foundation grant OCI: 0334088 (“Viable Network Defense for Scientific Research Institutions”). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation.
Bibliographic Information:
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71
Bibliographic Reference:
R. Sommer and V. Paxson. Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71, December 2005
Author: R. Sommer and V. Paxson
Group: Networking
Date: December 2005
PDF: http://www.icsi.berkeley.edu/pubs/networking/state-acsac05.pdf
Acknowledgements:
This work was partially supported by funding provided to ICSI through National Science Foundation grant OCI: 0334088 (“Viable Network Defense for Scientific Research Institutions”). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation.
Bibliographic Information:
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71
Bibliographic Reference:
R. Sommer and V. Paxson. Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71, December 2005
