Analysis of Firewall Policy Rules Using Data Mining Techniques
暂无分享,去创建一个
Ehab Al-Shaer | Latifur Khan | Korosh Golnabi | Richard K. Min | E. Al-Shaer | L. Khan | Korosh Golnabi
[1] Geoffrey I. Webb. Discovering associations with numeric variables , 2001, KDD '01.
[2] Venkatachary Srinivasan,et al. Packet classification using tuple space search , 1999, SIGCOMM '99.
[3] Thomas Y. C. Woo. A modular approach to packet classification: algorithms and results , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[4] Pasi Eronen,et al. An expert system for analyzing firewall rules , 2001 .
[5] George Varghese,et al. Fast firewall implementations for software-based and hardware-based routers , 2001, SIGMETRICS '01.
[6] Avishai Wool,et al. Firmato: a novel firewall management toolkit , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Steven L. Salzberg,et al. Book Review: C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993 , 1994, Machine Learning.
[8] Gregory Piatetsky-Shapiro,et al. Discovery, Analysis, and Presentation of Strong Rules , 1991, Knowledge Discovery in Databases.
[9] Jon Postel,et al. Internet Standard Subnetting Procedure , 1985, RFC.
[10] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[11] Wenke Lee,et al. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems , 1999 .
[12] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[13] Joshua D. Guttman,et al. Filtering postures: local enforcement for global policies , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[14] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[15] David Eppstein,et al. Internet packet filter management and rectangle geometry , 2000, SODA '01.
[16] Ehab Al-Shaer,et al. Firewall Policy Advisor for Anomaly Discovery and Rule Editing , 2003, Integrated Network Management.
[17] Avishai Wool,et al. Fang: a firewall analysis engine , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[18] Heiko Krumm,et al. Model-Based Tool-Assistance for Packet-Filter Design , 2001, POLICY.
[19] Guru M. Parulkar,et al. Detecting and resolving packet filter conflicts , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[20] Tao Zhang,et al. Association Rules , 2000, PAKDD.
[21] Elizabeth D. Zwicky,et al. Building Internet firewalls (2nd ed.) , 2000 .
[22] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[23] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[24] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[25] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[26] Scott Hazelhurst. Algorithms for Analysing Firewall and Router Access Lists , 2000, ArXiv.
[27] W. Campbell,et al. THE UNIVERSITY OF TEXAS AT DALLAS , 2004 .
[28] Philip K. Chan,et al. A machine learning approach to detecting attacks by identifying anomalies in network traffic , 2003 .
[29] Ramakrishnan Srikant,et al. Mining Association Rules with Item Constraints , 1997, KDD.
[30] John Wack,et al. Guidelines on Firewalls and Firewall Policy , 2002 .
[31] He Huang,et al. IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution , 2001, POLICY.
[32] Emil C. Lupu,et al. Conflict Analysis for Management Policies , 1997, Integrated Network Management.
[33] Robert N. Smith,et al. Fault and leak tolerance in firewall engineering , 1998, Proceedings Third IEEE International High-Assurance Systems Engineering Symposium (Cat. No.98EX231).
[34] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[35] Avishai Wool. Architecting the Lumeta Firewall Analyzer , 2001, USENIX Security Symposium.
[36] George Varghese,et al. Fast firewall implementations for software and hardware-based routers , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[37] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[38] Heikki Mannila,et al. Fast Discovery of Association Rules , 1996, Advances in Knowledge Discovery and Data Mining.
[39] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.