Web attack detection using entropy-based analysis
暂无分享,去创建一个
[1] A. Agogino,et al. Entropy based anomaly detection applied to space shuttle main engines , 2006, 2006 IEEE Aerospace Conference.
[2] Farnam Jahanian,et al. A comparative study of two network-based anomaly detection methods , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[4] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[5] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[6] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[8] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[9] Claude E. Shannon,et al. Prediction and Entropy of Printed English , 1951 .
[10] Didier Sornette,et al. Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics , 2009, PAM.
[11] Joshua Brody,et al. Distributed monitoring of conditional entropy for anomaly detection in streams , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW).