A machine learning approach to detecting attacks by identifying anomalies in network traffic
暂无分享,去创建一个
[1] Philip K. Chan,et al. Learning Models of Network Traffic for Detecting Novel Attacks , 2002 .
[2] Lada A. Adamic. Zipf, Power-laws, and Pareto-a ranking tutorial , 2000 .
[3] N. Meyers,et al. H = W. , 1964, Proceedings of the National Academy of Sciences of the United States of America.
[4] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[5] Michael Mitzenmacher,et al. A Brief History of Generative Models for Power Law and Lognormal Distributions , 2004, Internet Math..
[6] Murad S. Taqqu,et al. On the Self-Similar Nature of Ethernet Traffic , 1993, SIGCOMM.
[7] William A. Gale,et al. Good-Turing Frequency Estimation Without Tears , 1995, J. Quant. Linguistics.
[8] Steven M. Bellovin,et al. Packets found on an internet , 1993, CCRV.
[9] Anup K. Ghosh,et al. A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT , 1999, Recent Advances in Intrusion Detection.
[10] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[11] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[12] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[13] Sally Floyd,et al. Difficulties in simulating the internet , 2001, TNET.
[14] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[15] G. Zipf. The Psycho-Biology Of Language: AN INTRODUCTION TO DYNAMIC PHILOLOGY , 1999 .
[16] Åå Blockinð,et al. A Brief History of Generative Models for Power Lawand Lognormal , .
[17] Richard P. Lippmann,et al. 1999 DARPA Intrusion Detection Evaluation: Design and Procedures , 2001 .
[18] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[19] Ian H. Witten,et al. The zero-frequency problem: Estimating the probabilities of novel events in adaptive text compression , 1991, IEEE Trans. Inf. Theory.
[20] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[21] Dan Farmer,et al. Improving the Security of Your Site by Breaking Into it , 2000 .
[22] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[23] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[24] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[25] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[26] Ian H. Witten,et al. Modeling for text compression , 1989, CSUR.
[27] Stefan Savage,et al. The Spread of the Sapphire/Slammer Worm , 2003 .
[28] Lada A. Adamic,et al. The Nature of Markets in the World Wide Web , 1999 .
[29] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[30] Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey , 1998 .
[31] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[32] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[33] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[34] Dmitry A. Shkarin,et al. PPM: one step to practicality , 2002, Proceedings DCC 2002. Data Compression Conference.
[35] Walter Willinger,et al. On the Self-Similar Nature of Ethernet Traffic ( extended version ) , 1995 .
[36] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[37] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[38] W. Teahan,et al. Experiments on the zero frequency problem , 1995, Proceedings DCC '95 Data Compression Conference.
[39] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[40] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[41] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[42] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[43] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.