An On-Line Learning Statistical Model to Detect Malicious Web Requests
暂无分享,去创建一个
Philipp Winter | Eckehard Hermann | Markus Zeilinger | Harald Lampesberger | Philipp Winter | M. Zeilinger | Harald Lampesberger | Eckehard Hermann
[1] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[2] Christopher Krügel,et al. Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks , 2006, NDSS.
[3] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[4] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[5] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[6] Salvatore J. Stolfo,et al. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic , 2009, NDSS.
[7] Roy T. Fielding,et al. Uniform Resource Identifier (URI): Generic Syntax , 2005, RFC.
[8] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[9] Jian Pei,et al. Data Mining: Concepts and Techniques, 3rd edition , 2006 .
[10] David Salomon,et al. Data Compression: The Complete Reference , 2006 .
[11] W. Gasarch,et al. The Book Review Column 1 Coverage Untyped Systems Simple Types Recursive Types Higher-order Systems General Impression 3 Organization, and Contents of the Book , 2022 .
[12] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[13] Ran El-Yaniv,et al. On Prediction Using Variable Order Markov Models , 2004, J. Artif. Intell. Res..
[14] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[15] Yongdae Kim,et al. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems , 2009, SecureComm.
[16] Wenke Lee,et al. McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.
[17] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[18] Konrad Rieck,et al. TokDoc: a self-healing web application firewall , 2010, SAC '10.
[19] Marius Kloft,et al. Active learning for network intrusion detection , 2009, AISec '09.
[20] Alistair Moffat,et al. Implementing the PPM data compression scheme , 1990, IEEE Trans. Commun..
[21] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[22] B. Welford. Note on a Method for Calculating Corrected Sums of Squares and Products , 1962 .
[23] Roy T. Fielding,et al. Uniform Resource Identifiers (URI): Generic Syntax , 1998, RFC.
[24] David Thomas,et al. The Art in Computer Programming , 2001 .
[25] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[26] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[27] Christopher Krügel,et al. Protecting a Moving Target: Addressing Web Application Concept Drift , 2009, RAID.
[28] Konrad Rieck,et al. Incorporation of Application Layer Protocol Syntax into Anomaly Detection , 2008, ICISS.
[29] Stephanie Forrest,et al. Learning DFA representations of HTTP for protecting web applications , 2007, Comput. Networks.
[30] Christopher Krügel,et al. Effective Anomaly Detection with Scarce Training Data , 2010, NDSS.
[31] M. Evans. Statistical Distributions , 2000 .
[32] Ian H. Witten,et al. Data Compression Using Adaptive Coding and Partial String Matching , 1984, IEEE Trans. Commun..
[33] Donald E. Knuth. The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .
[34] Donald Ervin Knuth,et al. The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .
[35] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[36] Marc Toussaint,et al. Probabilistic inference for solving discrete and continuous state Markov Decision Processes , 2006, ICML.