The Kerf toolkit for intrusion analysis (Poster abstract). Aslam, J., Bratus, S., Kotz, D., Peterson, R., Rus, D., & Tofel, B. In Proceedings of the 2003 IEEE Workshop on Information Assurance, pages 301-303, 6, 2003. IEEE Computer Society Press.
Website abstract bibtex We consider the problem of intrusion analysis and present the Kerf toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf in detail, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.
@inProceedings{
title = {The Kerf toolkit for intrusion analysis (Poster abstract)},
type = {inProceedings},
year = {2003},
keywords = {dartmouth-cs,intrusion-detection,network,security},
pages = {301-303},
websites = {http://ieeexplore.ieee.org/iel5/8722/27611/01232441.pdf},
month = {6},
publisher = {IEEE Computer Society Press},
city = {West Point, NY},
id = {aef6c913-f15d-32a7-813d-16139d61835c},
created = {2018-07-12T21:31:34.812Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:34.812Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {aslam:toolkit-p},
source_type = {inproceedings},
notes = {A poster abstract.},
private_publication = {false},
abstract = {We consider the problem of intrusion analysis and present the Kerf toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf in detail, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.},
bibtype = {inProceedings},
author = {Aslam, Javed and Bratus, Sergey and Kotz, David and Peterson, Ron and Rus, Daniela and Tofel, Brett},
booktitle = {Proceedings of the 2003 IEEE Workshop on Information Assurance}
}
Downloads: 0
{"_id":"bwhPgDEEMmAg4QbXt","bibbaseid":"aslam-bratus-kotz-peterson-rus-tofel-thekerftoolkitforintrusionanalysisposterabstract-2003","downloads":0,"creationDate":"2019-02-15T15:14:59.401Z","title":"The Kerf toolkit for intrusion analysis (Poster abstract)","author_short":["Aslam, J.","Bratus, S.","Kotz, D.","Peterson, R.","Rus, D.","Tofel, B."],"year":2003,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"The Kerf toolkit for intrusion analysis (Poster abstract)","type":"inProceedings","year":"2003","keywords":"dartmouth-cs,intrusion-detection,network,security","pages":"301-303","websites":"http://ieeexplore.ieee.org/iel5/8722/27611/01232441.pdf","month":"6","publisher":"IEEE Computer Society Press","city":"West Point, NY","id":"aef6c913-f15d-32a7-813d-16139d61835c","created":"2018-07-12T21:31:34.812Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:34.812Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"aslam:toolkit-p","source_type":"inproceedings","notes":"A poster abstract.","private_publication":false,"abstract":"We consider the problem of intrusion analysis and present the Kerf toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf in detail, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.","bibtype":"inProceedings","author":"Aslam, Javed and Bratus, Sergey and Kotz, David and Peterson, Ron and Rus, Daniela and Tofel, Brett","booktitle":"Proceedings of the 2003 IEEE Workshop on Information Assurance","bibtex":"@inProceedings{\n title = {The Kerf toolkit for intrusion analysis (Poster abstract)},\n type = {inProceedings},\n year = {2003},\n keywords = {dartmouth-cs,intrusion-detection,network,security},\n pages = {301-303},\n websites = {http://ieeexplore.ieee.org/iel5/8722/27611/01232441.pdf},\n month = {6},\n publisher = {IEEE Computer Society Press},\n city = {West Point, NY},\n id = {aef6c913-f15d-32a7-813d-16139d61835c},\n created = {2018-07-12T21:31:34.812Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:34.812Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {aslam:toolkit-p},\n source_type = {inproceedings},\n notes = {A poster abstract.},\n private_publication = {false},\n abstract = {We consider the problem of intrusion analysis and present the Kerf toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf in detail, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.},\n bibtype = {inProceedings},\n author = {Aslam, Javed and Bratus, Sergey and Kotz, David and Peterson, Ron and Rus, Daniela and Tofel, Brett},\n booktitle = {Proceedings of the 2003 IEEE Workshop on Information Assurance}\n}","author_short":["Aslam, J.","Bratus, S.","Kotz, D.","Peterson, R.","Rus, D.","Tofel, B."],"urls":{"Website":"http://ieeexplore.ieee.org/iel5/8722/27611/01232441.pdf"},"bibbaseid":"aslam-bratus-kotz-peterson-rus-tofel-thekerftoolkitforintrusionanalysisposterabstract-2003","role":"author","keyword":["dartmouth-cs","intrusion-detection","network","security"],"downloads":0},"search_terms":["kerf","toolkit","intrusion","analysis","poster","abstract","aslam","bratus","kotz","peterson","rus","tofel"],"keywords":["dartmouth-cs","intrusion-detection","network","security","intrusion detection"],"authorIDs":["5c66d9b9e4b1db10000001ba","5c69efe6ac591010000000e0"]}