An improved payload-based anomaly detector for web applications
暂无分享,去创建一个
Dong Li | Baojiang Cui | Xiaohui Jin | Zishuai Cheng | Congxian Yin | Baojiang Cui | Dong Li | Zishuai Cheng | Xiaohui Jin | Congxian Yin
[1] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[2] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[3] Durbin,et al. Biological Sequence Analysis , 1998 .
[4] Giorgio Giacinto,et al. HMM-Web: A Framework for the Detection of Attacks Against Web Applications , 2009, 2009 IEEE International Conference on Communications.
[5] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.
[6] Wenke Lee,et al. McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.
[7] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[8] Pieter H. Hartel,et al. POSEIDON: a 2-tier anomaly-based network intrusion detection system , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).
[9] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[10] Horst Bunke,et al. Optimizing the number of states, training iterations and Gaussians in an HMM-based handwritten word recognizer , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[11] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[12] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[13] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[14] Xiangjian He,et al. RePIDS: A multi tier Real-time Payload-based Intrusion Detection System , 2013, Comput. Networks.
[15] Salvatore J. Stolfo,et al. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic , 2009, NDSS.
[16] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[17] Wenke Lee,et al. Evading network anomaly detection systems: formal reasoning and practical techniques , 2006, CCS '06.
[18] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[19] Eric van den Berg,et al. A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows , 2005, RAID.
[20] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[21] Roberto Tronci,et al. HMMPayl: An intrusion detection system based on Hidden Markov Models , 2011, Comput. Secur..
[22] Xiangjian He,et al. Intrusion Detection Using Geometrical Structure , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.
[23] V. Rao Vemuri,et al. Robust Support Vector Machines for Anomaly Detection in Computer Security , 2003, ICMLA.
[24] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[25] Inderjit S. Dhillon,et al. A Divisive Information-Theoretic Feature Clustering Algorithm for Text Classification , 2003, J. Mach. Learn. Res..