Unsupervised Monitoring of Network and Service Behaviour Using Self Organizing Maps
暂无分享,去创建一个
[1] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[2] Gonzalo Álvarez,et al. Application of the Generic Feature Selection Measure in Detection of Web Attacks , 2011, CISIS.
[3] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[4] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[5] Timo Hämäläinen,et al. Analysis of HTTP Requests for Anomaly Detection of Web Attacks , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.
[6] Malcolm I. Heywood,et al. Data analytics on network traffic flows for botnet behaviour detection , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
[7] Duc Le,et al. An Unsupervised Learning Approach for Network and System Analysis , 2017 .
[8] Philipp Winter,et al. Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[9] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[10] A. Nur Zincir-Heywood,et al. On botnet behaviour analysis using GP and C4.5 , 2014, GECCO.
[11] A. Nur Zincir-Heywood,et al. Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform? , 2017, Int. J. Netw. Manag..
[12] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[13] Philip S. Yu,et al. Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.
[14] István Szabó,et al. On the Validation of Traffic Classification Algorithms , 2008, PAM.
[15] A. Nur Zincir-Heywood,et al. Benchmarking the Effect of Flow Exporters and Protocol Filters on Botnet Traffic Classification , 2016, IEEE Systems Journal.
[16] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[17] Ali A. Ghorbani,et al. Botnet detection based on traffic behavior analysis and flow intervals , 2013, Comput. Secur..
[18] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[19] Xiaobo Zhou,et al. A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection , 2012, J. Parallel Distributed Comput..
[20] Aiko Pras,et al. Flow-Based Web Application Brute-Force Attack and Compromise Detection , 2017, Journal of Network and Systems Management.
[21] Leyla Bilge,et al. Automatically Generating Models for Botnet Detection , 2009, ESORICS.
[22] Zahid Anwar,et al. Semantic security against web application attacks , 2014, Inf. Sci..
[23] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[24] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[25] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[26] Ronaldo M. Salles,et al. Botnets: A survey , 2013, Comput. Networks.
[27] Gürsel Serpen,et al. Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set , 2004, Intell. Data Anal..
[28] Yao Zheng,et al. PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).