An Information-Theoretic Measure of Intrusion Detection Capability
暂无分享,去创建一个
Boris Skoric | Guofei Gu | Wenke Lee | David Dagon | Prahlad Fogla | Wenke Lee | B. Škorić | D. Dagon | G. Gu | Prahlad Fogla
[1] John E. Gaffney,et al. Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[2] Kymie M. C. Tan,et al. Benchmarking anomaly-based detection systems , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[3] Vyacheslav P. Tuzlukov,et al. Signal detection theory , 2001 .
[4] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[5] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[6] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[7] Max A. Viergever,et al. Mutual-information-based registration of medical images: a survey , 2003, IEEE Transactions on Medical Imaging.
[8] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[9] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[10] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[11] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[12] J A Swets,et al. Measuring the accuracy of diagnostic systems. , 1988, Science.
[13] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[14] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[15] Paul Helman,et al. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..
[16] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[17] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[18] Marc Dacier,et al. Design of an Intrusion-Tolerant Intrusion Detection System , 2002 .
[19] John E. Gaffney,et al. Evaluation of Intrusion Detection Systems , 2003, Journal of research of the National Institute of Standards and Technology.
[20] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[21] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[22] Joydeep Ghosh,et al. Relationship-based clustering and cluster ensembles for high-dimensional data mining , 2002 .
[23] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[24] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[25] Stefan Axelsson. A Preliminary Attempt to Apply Detection and Estimation Theory to Intrusion Detection , 2007 .
[26] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.