Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
暂无分享,去创建一个
Akira Yamada | Toshiaki Tanaka | Keisuke Takemori | Yutaka Miyake | A. Yamada | Toshiaki Tanaka | Yutaka Miyake | K. Takemori
[1] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[2] Martin Roesch,et al. SNORT: The Open Source Network Intrusion Detection System 1 , 2002 .
[3] Paul Douglas,et al. Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[4] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[7] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[8] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[9] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.