Statistical anomaly denial of service and reconnaissance intrusion detection
暂无分享,去创建一个
[1] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[2] Walter Willinger,et al. On the Self-Similar Nature of Ethernet Traffic ( extended version ) , 1995 .
[3] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[4] Robert K. Cunningham,et al. Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.
[5] Fabio Roli,et al. Intrusion detection in computer networks by multiple classifier systems , 2002, Object recognition supported by user interaction for service robots.
[6] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[7] Anupam Joshi,et al. Fuzzy clustering for intrusion detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[8] Zheng Zhang,et al. COMPARISON OF WAVELET COMPRESSION ALGORITHMS IN NETWORK INTRUSION DETECTION , 2001 .
[9] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[10] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[11] Stephen Grossberg,et al. Fuzzy ARTMAP: an adaptive resonance architecture for incremental learning of analog maps , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[12] Rubel F. Martinez. A Pattern Recognition Feature Optimization Tool Using the Visual Empirical Region of Influence Algorithm , 2002 .
[13] Bo Gao,et al. HMMs (Hidden Markov models) based on anomaly intrusion detection method , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[14] Ron Kohavi,et al. Wrappers for feature selection , 1997 .
[15] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[16] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[17] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[18] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[19] Ron Kohavi,et al. Irrelevant Features and the Subset Selection Problem , 1994, ICML.
[20] B. Ravichandran,et al. Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[21] Kotagiri Ramamohanarao,et al. A probabilistic approach to detecting network scans , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).
[22] Stefan Axelsson. On a Difficulty of Intrusion Detection , 1999, Recent Advances in Intrusion Detection.
[23] Giancarlo Ruffo,et al. Intrusion Detection through Behavioral Data , 1999, IDA.
[24] Li Jun,et al. HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[25] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[26] Bongnam Noh,et al. Network Intrusion Detection Using Statistical Probability Distribution , 2006, ICCSA.
[27] Sujit K. Ghosh,et al. Essential Wavelets for Statistical Applications and Data Analysis , 2001, Technometrics.
[28] A.M. Cansian,et al. Neural networks applied in intrusion detection systems , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).
[29] M.I. Heywood,et al. Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[30] S. Mallat. A wavelet tour of signal processing , 1998 .
[31] Nello Cristianini,et al. Support vector machine classification and validation of cancer tissue samples using microarray expression data , 2000, Bioinform..
[32] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[33] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[34] ZHENG ZHANG,et al. Neural Networks in Statistical Anomaly Intrusion Detection , 2001 .
[35] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[36] Erland Jonsson,et al. An integrated framework for security and dependability , 1998, NSPW '98.
[37] Usama M. Fayyad,et al. Knowledge Discovery in Databases: An Overview , 1997, ILP.
[38] C. N. Manikopoulos,et al. Neural net nonlinear prediction for speech data , 1991 .
[39] Salvatore J. Stolfo,et al. Surveillance detection in high bandwidth environments , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[40] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[41] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[42] Daniel James Weber,et al. A taxonomy of computer intrusions , 1998 .
[43] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .