Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection
暂无分享,去创建一个
Deepak S. Turaga | Jiawei Han | Wei Fan | Lu Su | Jing Gao | Xiaoqiao Meng | Olivier Verscheure | Jiawei Han | D. Turaga | O. Verscheure | Lu Su | Xiaoqiao Meng | Jing Gao | W. Fan
[1] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[2] Joydeep Ghosh,et al. Cluster Ensembles --- A Knowledge Reuse Framework for Combining Multiple Partitions , 2002, J. Mach. Learn. Res..
[3] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[4] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[5] Fabio Roli,et al. Intrusion Detection in Computer Systems Using Multiple Classifier Systems , 2008 .
[6] 穂鷹 良介. Non-Linear Programming の計算法について , 1963 .
[7] Bo Sheng,et al. Outlier detection in sensor networks , 2007, MobiHoc '07.
[8] Giovanni Seni,et al. Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions , 2010, Ensemble Methods in Data Mining.
[9] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[10] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[11] Kavé Salamatian,et al. Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.
[12] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[13] Yizhou Sun,et al. Graph-based Consensus Maximization among Multiple Supervised and Unsupervised Models , 2009, NIPS.
[14] R. Polikar,et al. Ensemble based systems in decision making , 2006, IEEE Circuits and Systems Magazine.
[15] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[16] Thomas G. Dietterich. Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.
[17] Jason Lee,et al. The devil and packet trace anonymization , 2006, CCRV.
[18] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[19] Alvaro A. Cárdenas,et al. Principled reasoning and practical applications of alert fusion in intrusion detection systems , 2008, ASIACCS '08.
[20] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[21] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.