A Hybrid approach using Signature and Anomaly Detection to detect network Intrusions
暂无分享,去创建一个
[1] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[2] Philip K. Chan,et al. A machine learning approach to detecting attacks by identifying anomalies in network traffic , 2003 .
[3] Jie Yang,et al. HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree , 2010, 2010 International Conference on Communications and Mobile Computing.
[4] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[5] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[6] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[7] J. Chow. An Assessment of the DARPA IDS Evaluation Dataset Using Snort S Terry Brugger , 2005 .
[8] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[9] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[10] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[11] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[12] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[13] Henry L. Owen,et al. The use of Honeynets to detect exploited systems across large enterprise networks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[14] Yihua Liao,et al. Machine learning in intrusion detection , 2005 .
[15] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[16] Fakariah Hani Mohd Ali,et al. Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).
[17] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[18] Consolación Gil,et al. Design of a Snort-Based Hybrid Intrusion Detection System , 2009, IWANN.
[19] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[20] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[21] Valentin Cristea,et al. Hybrid network Intrusion Detection , 2011, 2011 IEEE 7th International Conference on Intelligent Computer Communication and Processing.
[22] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[23] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[24] A. Halim Zaim,et al. A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..
[25] Fredrick Mtenzi,et al. Intrusion Detection Based on Data Mining , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[26] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[27] Jesus E. Diaz-Verdejo,et al. A Snort-based approach for the development and deployment of hybrid IDS , 2007, IEEE Latin America Transactions.
[28] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[29] S Krishnaveni,et al. A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques , 2011 .
[30] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[31] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[32] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[33] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[34] H. Gharaee,et al. A novel hybrid anomaly based intrusion detection method , 2012, 6th International Symposium on Telecommunications (IST).