{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:51:16Z","timestamp":1761580276079,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030088","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"21-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":105,"title":["Testing network-based intrusion detection signatures using mutant exploits"],"prefix":"10.1145","author":[{"given":"Giovanni","family":"Vigna","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, CA"}]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, CA"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"Reliable Software Group and University of California, Santa Barbara, CA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anzen. nidsbench: A Network Intrusion Detection System Test Suite. http:\/\/packetstorm.widexs.nl\/UNIX\/IDS\/nidsbench\/ 1999.  Anzen. nidsbench: A Network Intrusion Detection System Test Suite. http:\/\/packetstorm.widexs.nl\/UNIX\/IDS\/nidsbench\/ 1999."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.hsc.fr\/ressources\/outils\/idswakeup\/","author":"Aubert S.","year":"2000","unstructured":"S. Aubert . Idswakeup. http:\/\/www.hsc.fr\/ressources\/outils\/idswakeup\/ , 2000 . S. Aubert. Idswakeup. http:\/\/www.hsc.fr\/ressources\/outils\/idswakeup\/, 2000."},{"key":"e_1_3_2_1_3_1","volume-title":"Vulnerability Testing of Software System Using Fault Injection","author":"Du W.","year":"1998","unstructured":"W. Du and A. P. Mathur . Vulnerability Testing of Software System Using Fault Injection . Technical Report , COAST, Purdue University , West Lafayette, IN, US, April 1998 . W. Du and A. P. Mathur. Vulnerability Testing of Software System Using Fault Injection. Technical Report, COAST, Purdue University, West Lafayette, IN, US, April 1998."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306571"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306571"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.44380"},{"key":"e_1_3_2_1_7_1","unstructured":"C. Giovanni. Fun with Packets: Designing a Stick. http:\/\/www.eurocompton.net\/stick\/ 2002.  C. Giovanni. Fun with Packets: Designing a Stick. http:\/\/www.eurocompton.net\/stick\/ 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176995"},{"key":"e_1_3_2_1_9_1","volume-title":"ETH Zurich Diploma Thesis","author":"Marty R.","year":"2002","unstructured":"R. Marty . Thor : A Tool to Test Intrusion Detection Systems by Variations of Attacks . ETH Zurich Diploma Thesis , March 2002 . R. Marty. Thor: A Tool to Test Intrusion Detection Systems by Variations of Attacks. ETH Zurich Diploma Thesis, March 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"e_1_3_2_1_11_1","volume-title":"http:\/\/www.iss.net\/","author":"ISS.","year":"2004","unstructured":"ISS. Realsecure 7.0. http:\/\/www.iss.net\/ , 2004 . ISS. Realsecure 7.0. http:\/\/www.iss.net\/, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.386985"},{"volume-title":"http:\/\/www.ktwo.ca\/security.html","year":"2004","key":"e_1_3_2_1_13_1","unstructured":"K2. ADMmutate. http:\/\/www.ktwo.ca\/security.html , 2004 . K2. ADMmutate. http:\/\/www.ktwo.ca\/security.html, 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the DARPA Information Survivability Conference and Exposition","volume":"2","author":"Lippmann R.","year":"2000","unstructured":"R. Lippmann , D. Fried , I. Graf , J. Haines , K. Kendall , D. McClung , D. Weber , S. Webster , D. Wyschogrod , R. Cunningham , and M. Zissman . Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation . In Proceedings of the DARPA Information Survivability Conference and Exposition , Volume 2 , Hilton Head, SC , January 2000 . R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman. Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition, Volume 2, Hilton Head, SC, January 2000."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/www.metasploit.com\/","author":"Project Metasploit","year":"2004","unstructured":"Metasploit Project . Metasploit. http:\/\/www.metasploit.com\/ , 2004 . Metasploit Project. Metasploit. http:\/\/www.metasploit.com\/, 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956465"},{"key":"e_1_3_2_1_18_1","volume-title":"http:\/\/osec.neohapsis.com\/","author":"Project Neohapsis OSEC","year":"2004","unstructured":"Neohapsis OSEC Project . Neohapsis OSEC. http:\/\/osec.neohapsis.com\/ , 2004 . Neohapsis OSEC Project. Neohapsis OSEC. http:\/\/osec.neohapsis.com\/, 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/wp.netscape.com\/eng\/security\/SSL_2.html","author":"Netscape Communications Corporation","year":"1995","unstructured":"Netscape Communications Corporation . SSL 2.0 Protocol Specification . http:\/\/wp.netscape.com\/eng\/security\/SSL_2.html , 1995 . Netscape Communications Corporation. SSL 2.0 Protocol Specification. http:\/\/wp.netscape.com\/eng\/security\/SSL_2.html, 1995."},{"key":"e_1_3_2_1_20_1","volume-title":"NSS IDS Evaluation","author":"Network Security Services Group","year":"2004","unstructured":"Network Security Services Group . NSS IDS Evaluation ( 4 th Edition). http:\/\/www.nss.co.uk\/ips, 2004 . Network Security Services Group. NSS IDS Evaluation (4th Edition). http:\/\/www.nss.co.uk\/ips, 2004.","edition":"4"},{"key":"e_1_3_2_1_21_1","volume-title":"http:\/\/www.faqs.org\/rfcs\/rfc2460.html","author":"Network Working Group","year":"1998","unstructured":"Network Working Group . Internet Protocol , Version 6 (IPv6) Specification . http:\/\/www.faqs.org\/rfcs\/rfc2460.html , 1998 . Network Working Group. Internet Protocol, Version 6 (IPv6) Specification. http:\/\/www.faqs.org\/rfcs\/rfc2460.html, 1998."},{"key":"e_1_3_2_1_22_1","unstructured":"Network Working Group. Hypertext Transfer Protocol -- HTTP\/1.1. http:\/\/www.w3.org\/Protocols\/rfc2616\/rfc2616.html 1999.  Network Working Group. Hypertext Transfer Protocol -- HTTP\/1.1. http:\/\/www.w3.org\/Protocols\/rfc2616\/rfc2616.html 1999."},{"key":"e_1_3_2_1_23_1","volume-title":"http:\/\/www.nextgenss.com\/","author":"Software Security Ltd Next Generation","year":"2004","unstructured":"Next Generation Software Security Ltd . NGSS Evaluation . http:\/\/www.nextgenss.com\/ , 2004 . Next Generation Software Security Ltd. NGSS Evaluation. http:\/\/www.nextgenss.com\/, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_26_1","volume-title":"December","author":"Ranum M.","year":"2001","unstructured":"M. Ranum . Experience Benchmarking Intrusion Detection Systems. NFR Security White Paper , December 2001 . M. Ranum. Experience Benchmarking Intrusion Detection Systems. NFR Security White Paper, December 2001."},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/www.robertgraham.com\/tmp\/sidestep.html","author":"Graham R.","year":"2004","unstructured":"R. Graham . SideStep. http:\/\/www.robertgraham.com\/tmp\/sidestep.html , 2004 . R. Graham. SideStep. http:\/\/www.robertgraham.com\/tmp\/sidestep.html, 2004."},{"key":"e_1_3_2_1_28_1","volume-title":"Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference","author":"Roesch M.","year":"1999","unstructured":"M. Roesch . Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference , November 1999 . M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, November 1999."},{"key":"e_1_3_2_1_29_1","volume-title":"http:\/\/www.atstake.com\/research\/tools\/vulnerability_scanning\/","author":"Aitel D.","year":"2004","unstructured":"D. Aitel . Sharefuzz. http:\/\/www.atstake.com\/research\/tools\/vulnerability_scanning\/ , 2004 . D. Aitel. Sharefuzz. http:\/\/www.atstake.com\/research\/tools\/vulnerability_scanning\/, 2004."},{"volume-title":"http:\/\/www.sec33.com\/sniph\/","year":"2001","key":"e_1_3_2_1_30_1","unstructured":"Sniph. Snot. http:\/\/www.sec33.com\/sniph\/ , 2001 . Sniph. Snot. http:\/\/www.sec33.com\/sniph\/, 2001."},{"key":"e_1_3_2_1_31_1","volume-title":"http:\/\/www.immunitysec.com\/resources\/freesoftware.shtml","author":"Aitel D.","year":"2004","unstructured":"D. Aitel . Spike. http:\/\/www.immunitysec.com\/resources\/freesoftware.shtml , 2004 . D. Aitel. Spike. http:\/\/www.immunitysec.com\/resources\/freesoftware.shtml, 2004."},{"key":"e_1_3_2_1_32_1","unstructured":"The Apache HTTP Server Project. Apache HTTP Server. http:\/\/httpd.apache.org\/ 2004.  The Apache HTTP Server Project. Apache HTTP Server. http:\/\/httpd.apache.org\/ 2004."},{"key":"e_1_3_2_1_33_1","volume-title":"http:\/\/www.openssl.org\/","author":"Project The","year":"2004","unstructured":"The OpenSSL Project . Open SSL. http:\/\/www.openssl.org\/ , 2004 . The OpenSSL Project. OpenSSL. http:\/\/www.openssl.org\/, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.587545"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030088","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":33,"alternative-id":["10.1145\/1030083.1030088","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030088","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}