LIST OF REFERENCES [1] D. Anderson, Th. Frivold and A. Valdes. Next-generation intrusion detection expert system (NIDES): A summary. SRI-CSL-95-07, SRI International, Menlo Park, CA, May 1995 [2] F. Apap, A. Honing, S. Hershkop, E. Eskin and S. Stolfo. Detecting malicious software by monitoring anamalous Windows registry accesses. In Proceedings of Recent Advances in Intrusion Detection, pages 36-53, Zurich, Switzerland, October 2002. [3] M. Asaka, S. Okazawa, A. Taguchi and S. Goto. A method for tracing intruders by use of mobile agents. In Proceedings oflNET, pages 87-99, San Jose, California, June 1999. [4] J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff and E. Spafford, D. Zamboni. An architecture for intrusion detection using autonomous agents. In Proceedings of the Annual Computer Security Applications Conference, IEEE Computer Society, pages 13-24, Scottsdale, Arizona, December 1998. [5] S. Balasubramanian. An architecture for protection of network hosts from denial of service attacks. Master of Science Thesis. Computer and Information Science and Engineering. University of Florida, Gainesville, FL, 2000. [6] M. Chengalvarayan. Knowledge sharing in distributed generic intrusion detection model. Master of Science Thesis. Computer and Information Science and Engineering. University of Florida, Gainesville, FL, 2002. [7] Cisco Systems Inc. Cisco Catalyst 6000 intrusion detection system module, 1992. WWW page at http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/prodlit/ 6kids_ds.htm (accessed August 2002) [8] D. E. Denning and P. G. Neumann. Requirements and model for IDES A real- time intrusion detection expert system, technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 1985 [9] S. T. Eckmann. Translating snort rules to STATL scenarios, 2001. WWW page at: http://www.raid-symposium.org/Raid2001/papers/eckmann_raid2001.pdf (accessed September 2002).