The IPID Project
Informatica / IPID
Home Universiteit Twente
IPID homepage
Publications
Project members
DIES Research Group
IS Research Group
 
Contact
IPID publications

2009

Bolzoni, D. (2009) Revisiting Anomaly-based Network Intrusion Detection Systems. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-147 ISBN 978-90-365-2853-5
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. Technical Report TR-CTIT-09-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (RAID). pp. 1-20. Lecture Notes in Computer Science 5758. Springer Verlag. ISBN 978-3-642-04341-3
Houmb, S.H. and Nunes Leal Franqueira, V. (2009) Estimating ToE Risk Level using CVSS. In: Proceedings of the Fourth International Conference on Availability, Reliability and Security (ARES 2009 - The International Dependability Conference), 16-19 March 2009, Fukuoka, Japan. pp. 718-725. IEEE Conference Proceedings. IEEE Computer Society. ISSN 1077-2626 ISBN 978-0-7695-3564-7
Nunes Leal Franqueira, V. (2009) Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 09-154 ISBN 978-90-365-2923-5
Nunes Leal Franqueira, V. and van Eck, P.A.T. and Wieringa, R.J. and Lopes, R.H.C. (2009) A Mobile Ambients-based Approach for Network Attack Modelling and Simulation. In: Proceedings of the Fourth International Workshop on Dependability Aspects on Data Warehousing and Mining applications, DAWAM 2009 (in conjunction with ARES 2009, The Fourth International Conference on Availability, Reliability and Security), 16-19 Mar 2009, Fukuoka, Japan. pp. 546-553. IEEE Computer Society. ISBN 978-0-7695-3564-7
Nunes Leal Franqueira, V. and Lopes, R.H.C. and van Eck, P.A.T. (2009) Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients. In: Proceeding of the 24th Annual ACM Symposium on Applied Computing, SAC'2009, 08-12 March 2009, Honolulu, Hawaii, USA. pp. 66-73. ACM. ISBN 978-1-60558-166-8

2008

Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. Technical Report TR-CTIT-08-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security 38. Springer Verlag, London, pp. 1-16. ISBN 978-0-387-77265-3
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Technical Report TR-CTIT-08-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico. pp. 938-955. Lecture Notes in Computer Science 5332. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-88872-7
Houmb, S.H. and Nunes Leal Franqueira, V. and Engum, E.A. (2008) Estimating Impact and Frequency of Risks to Safety and Mission Critical Systems Using CVSS. In: ISSRE 2008 Supplemental Proceedings: 1st Workshop on Dependable Software Engineering, 11 November 2008, Seattle, US. IEEE Computer Society. ISBN 978-1-4244-3417-6
Nunes Leal Franqueira, V. and van Keulen, M. (2008) Analysis of the NIST database towards the composition of vulnerabilities in attack scenarios. Technical Report TR-CTIT-08-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and Lopes, R.H.C. and van Eck, P.A.T. (2008) Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients. Technical Report TR-CTIT-08-44, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Welberg, S.M. (2008) Vulnerability management tools for COTS software - A comparison. Technical Report TR-CTIT-08-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2007

Bolzoni, D. and Crispo, B. and Etalle, S. (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 11-16 November 2007, Dallas, Texas. pp. 141-152. Usenix Association. ISBN 978-1-931971-55-3
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany. pp. 145-154. Lecture Notes in Computer Science 4657. Springer Verlag. ISBN 978-3-540-74408-5
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. Technical Report TR-CTIT-07-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2007) Defense against Insider Threat: a Framework for Gathering Goal-based Requirements. In: Proceedings of the 12th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD 2007), held in conjuction with CAISE'07, 11-15 June 2007, Trondheim, Norway. pp. 193-202. Tapir Academic Press. ISBN 978-82-519-2245-6
Nunes Leal Franqueira, V. and Lopes, R.H.C. (2007) Vulnerability Assessment by Learning Attack Specifications in Graphs. In: The Third International Symposium on Information Assurance and Security, 29-31 August 2007, Manchester, UK. pp. 161-164. IEEE Computer Society. ISBN 978-0-7695-2876-2
Nunes Leal Franqueira, V. and Lopes, R.H.C. and van Eck, P.A.T. (2007) An Evolutionary Approach for Learning Attack Specifications in Network Graphs. Technical Report TR-CTIT-07-40, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection (ICIMP), 1-5 Jul 2007, San Jose, CA, USA. pp. 33-33. IEEE Computer Society. ISBN 0-7695-2911-9
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. Technical Report TR-CTIT-07-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2006

Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. Technical Report TR-CTIT-06-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: 4th IEEE Int. Information Assurance Workshop (IWIA2006), 13-14 Apr 2006, London, UK. pp. 144-156. IEEE Computer Society. ISBN 0 7695 2564 4
Nunes Leal Franqueira, V. (2006) Access Control from an Intrusion Detection Perspective. Technical Report TR-CTIT-06-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. (2006) Evolution of security policies. In: Doctoral Symposium Proceedings of the 14th IEEE International Requirements Engineering Conference (RE06), 11-15 Sep 2006, Minnesota, USA. Univ. of Zuerich. ISBN not assigned
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2006) Towards alignment of architectural domains in security policy specifications. Technical Report TR-CTIT-06-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2006) Defense against Insider Threat: a Framework for Gathering Goal-based Requirements. Technical Report TR-CTIT-06-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nunes Leal Franqueira, V. and van Eck, P.A.T. (2006) Towards alignment of architectural domains in security policy specifications. In: Proccedings of the 8th International Symposium on System and Information Security, 08-10 Nov 2006, Sao Jose dos Campos, Brazil. Fundacao Casimiro Montenegro Filho - CTA/ITA. ISBN 85-87978-13-6
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. Technical Report TR-CTIT-06-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services. Technical Report TR-CTIT-06-73, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Su, X. and Bolzoni, D. and van Eck, P.A.T. (2006) A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements. In: 11th International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD2006), 5-9 Jun 2006, Luxembourg. pp. 465-472. Presses Universitaries de Namur. ISBN 2-87037-525-5

2005

Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2005) Poseidon: A 2-tier Anomaly-based Intrusion Detection System. Technical Report TR-CTIT-05-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Top
Last modified on 08/03/2006 © Universiteit Twente