An Adaptive Real-Time Architecture for Zero-Day Threat Detection
暂无分享,去创建一个
Otto Carlos Muniz Bandeira Duarte | Guy Pujolle | Alvaro A. Cárdenas | Martin Andreoni Lopez | Antonio Gonzalez Pastana Lobato | Igor Jochem Sanz | G. Pujolle | O. Duarte | A. Cárdenas | I. J. Sanz | A. Lobato
[1] Alvaro A. Cárdenas,et al. Big Data Analytics for Security , 2013, IEEE Security & Privacy.
[2] Jie Wu,et al. Clustering analysis for malicious network traffic , 2017, 2017 IEEE International Conference on Communications (ICC).
[3] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[4] Sharath Chandra Guntuku,et al. Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests , 2014, Inf. Sci..
[5] Imran Muhammad,et al. Hadoop Based Real-Time Intrusion Detection for High-Speed Networks , 2016 .
[6] Philippe Owezarski. A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks , 2015, AsiaCCS.
[7] Elad Hazan,et al. Introduction to Online Convex Optimization , 2016, Found. Trends Optim..
[8] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[9] Otto Carlos Muniz Bandeira Duarte,et al. A Performance Comparison of Open-Source Stream Processing Platforms , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[10] Richard E. Overill,et al. Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.
[11] Hiroki Takakura,et al. Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation , 2011, BADGERS '11.
[12] Peter Clay. A modern threat response framework , 2015, Netw. Secur..
[13] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[14] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[15] Otto Carlos Muniz Bandeira Duarte,et al. Collecting and characterizing a real broadband access network traffic dataset , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[16] Marcin Nawrocki,et al. A Survey on Honeypot Software and Data Analysis , 2016, ArXiv.
[17] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[18] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..