Compression Analytics for Classification and Anomaly Detection Within Network Communication
暂无分享,去创建一个
[1] Ning Wu,et al. On Compression-Based Text Classification , 2005, ECIR.
[2] Vitaly Shmatikov,et al. Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[3] Ko Fujimura,et al. Tweet classification by data compression , 2011, DETECT '11.
[4] Przemyslaw Berezinski,et al. Entropy-Based Internet Traffic Anomaly Detection: A Case Study , 2014, DepCoS-RELCOMEX.
[5] Ian H. Witten,et al. Arithmetic coding for data compression , 1987, CACM.
[6] Qi Liao,et al. Spatial-Temporal Anomaly Detection Using Security Visual Analytics via Entropy Graph and Eigen Matrix , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[7] Christian Callegari,et al. On the Use of Compression Algorithms for Network Anomaly Detection , 2009, 2009 IEEE International Conference on Communications.
[8] Todd Millstein,et al. Finding protocol manipulation attacks , 2011, SIGCOMM 2011.
[9] Vitaly Shmatikov,et al. The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Ming Li,et al. Clustering by compression , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[11] Julia Hirschberg,et al. V-Measure: A Conditional Entropy-Based External Cluster Evaluation Measure , 2007, EMNLP.
[12] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[13] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[14] M Damashek,et al. Gauging Similarity with n-Grams: Language-Independent Categorization of Text , 1995, Science.
[15] Alistair Moffat,et al. Implementing the PPM data compression scheme , 1990, IEEE Trans. Commun..
[16] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[17] Ronald de Wolf,et al. Algorithmic Clustering of Music Based on String Compression , 2004, Computer Music Journal.
[18] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[19] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[20] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[21] Vlado Keselj,et al. n-Gram-based classification and unsupervised hierarchical clustering of genome sequences , 2006, Comput. Methods Programs Biomed..
[22] Ian H. Witten,et al. Data Compression Using Adaptive Coding and Partial String Matching , 1984, IEEE Trans. Commun..
[23] Nan Wang,et al. An Anomaly Detection Algorithm Based on Lossless Compression , 2012, 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage.
[24] C. D. Kemp,et al. Density Estimation for Statistics and Data Analysis , 1987 .
[25] Subutai Ahmad,et al. Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.
[26] E.P. Rathgeb,et al. On the Robustness of SCTP against DoS Attacks , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[27] Alfred O. Hero,et al. Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies , 2017, IEEE Transactions on Information Forensics and Security.
[28] Gonzalo Camarillo,et al. Security Attacks Found Against the Stream Control Transmission Protocol (SCTP) and Current Countermeasures , 2007, RFC.
[29] Bin Ma,et al. The similarity metric , 2001, IEEE Transactions on Information Theory.
[30] Ian H. Witten,et al. Text categorization using compression models , 2000, Proceedings DCC 2000. Data Compression Conference.
[31] Alfonso Ortega,et al. Common Pitfalls Using the Normalized Compression Distance: What to Watch Out for in a Compressor , 2005, Commun. Inf. Syst..
[32] Travis L. Bauer,et al. Compression-Based Algorithms for Deception Detection , 2017, SocInfo.
[33] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[34] Rebecca Schuller Borbely,et al. On normalized compression distance and large malware , 2015, Journal of Computer Virology and Hacking Techniques.
[35] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[36] B. Silverman,et al. Density Estimation for Statistics and Data Analysis , 1987 .