Exploiting Independent State For Network Intrusion Detection

TitleExploiting Independent State For Network Intrusion Detection
Publication TypeConference Paper
Year of Publication2005
AuthorsSommer, R., & Paxson V.
Published inProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005)
Page(s)59-71
Other Numbers1850
Acknowledgment

This work was partially supported by funding provided to ICSI through National Science Foundation grant OCI: 0334088 (“Viable Network Defense for Scientific Research Institutions”). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation.

URLhttp://www.icsi.berkeley.edu/pubs/networking/state-acsac05.pdf
Bibliographic Notes

Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71

Abbreviated Authors

R. Sommer and V. Paxson

ICSI Research Group

Networking and Security

ICSI Publication Type

Article in conference proceedings