Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
暂无分享,去创建一个
[1] Sung-Bae Cho,et al. Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.
[2] Ken Frazer,et al. Building secure software: how to avoid security problems the right way , 2002, SOEN.
[3] Sushil Jajodia,et al. CARDS: A Distributed System for Detecting Coordinated Attacks , 2000, SEC.
[4] Neil C. Rowe,et al. Distributed Intrusion Detection for Computer Systems Using Communicating Agents CAPT , 2006 .
[5] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.
[6] Yarochkin Fyodor. 'Snortnet' - A Distributed Intrusion Detection System , 2000 .
[7] Sung-Bae Cho,et al. Detecting intrusion with rule-based integration of multiple models , 2003, Comput. Secur..
[8] Nong Ye,et al. Profile-Based Information Fusion for Intrusion Detection , .
[9] Wenke Lee,et al. Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[10] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[11] Sushil Jajodia,et al. Abstraction-based misuse detection: high-level specifications and adaptable strategies , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[12] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[14] Guo Wei,et al. Network monitoring in broadband network , 2001 .
[15] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[16] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[17] C T Dinardo,et al. Computers and security , 1986 .
[18] Gitae Kim,et al. NOMAD: traffic-based network monitoring framework for anomaly detection , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).
[19] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[20] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[21] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[22] J. M. Pullen,et al. Countering denial-of-service attacks using congestion triggered packet sampling and filtering , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[23] Ronald F. DeMara,et al. Mitigation of network tampering using dynamic dispatch of mobile agents , 2004, Comput. Secur..
[24] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[25] Sven Dietrich,et al. Analyzing Distributed Denial of Service Tools: The Shaft Case , 2000, LISA.
[26] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[27] Won Suk Lee,et al. An anomaly intrusion detection method by clustering normal user behavior , 2003, Comput. Secur..
[28] Pau-Chen Cheng,et al. BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.
[29] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..