Improving NIDS Performance Through Hardware-based Connection Filtering
暂无分享,去创建一个
[1] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[2] Haoyu Song,et al. Efficient packet classification for network intrusion detection using FPGA , 2005, FPGA '05.
[3] Mike Hall,et al. Capacity Verification for High Speed Network Intrusion Detection Systems , 2002, RAID.
[4] Paul Barford,et al. Self-configuring network traffic generation , 2004, IMC '04.
[5] Vinod Yegneswaran,et al. A framework for malicious workload generation , 2004, IMC '04.
[6] QUTdN QeO,et al. Random early detection gateways for congestion avoidance , 1993, TNET.
[7] Vinod Yegneswaran,et al. On the Design and Use of Internet Sinks for Network Abuse Monitoring , 2004, RAID.
[8] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[9] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[10] Anja Feldmann,et al. Operational experiences with high-volume network intrusion detection , 2004, CCS '04.
[11] Lambert Schaelicke,et al. Characterizing the Performance of Network Intrusion Detection Sensors , 2003, RAID.
[12] Evangelos P. Markatos,et al. An active traffic splitter architecture for intrusion detection , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..
[13] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[14] Wenke Lee,et al. A hardware platform for network intrusion detection and prevention , 2005 .
[15] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[16] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[17] Vinod Yegneswaran,et al. Characteristics of internet background radiation , 2004, IMC '04.
[18] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[19] Christopher Krügel,et al. Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.