Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems
暂无分享,去创建一个
[1] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[2] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[3] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .
[4] Gordon A. Manson,et al. Networks security measures using neuro-fuzzy agents , 2003, Inf. Manag. Comput. Secur..
[5] Sushil Jajodia,et al. Abstraction-based intrusion detection in distributed environments , 2001, TSEC.
[6] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .
[7] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] Belur V. Dasarathy. Data mining, intrusion detection, information assurance, and data networks security 2006 : 17-18 April 2006, Kissimmee, Florida, USA , 2006 .
[9] Srinivasan Parthasarathy,et al. LOADED: link-based outlier and anomaly detection in evolving data sets , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[10] John Wilander,et al. A Comparison of Publicly Available Tools for Static Intrusion Prevention , 2002 .
[11] Jaideep Srivastava,et al. Detection of Novel Network Attacks Using Data Mining , 2003 .
[12] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[13] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[14] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[15] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[16] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[17] Hossein Bidgoli. The Internet Encyclopedia , 2003 .
[18] Ian Witten,et al. Data Mining , 2000 .
[19] Ali A. Ghorbani,et al. Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[20] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[21] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[22] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[23] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[24] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[25] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[26] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[27] Mikhail Petrovskiy,et al. Outlier Detection Algorithms in Data Mining Systems , 2003, Programming and Computer Software.
[28] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[29] Hervé Debar. An Introduction to Intrusion-Detection Systems , 2000 .
[30] Salvatore J. Stolfo,et al. FLIPS: Hybrid Adaptive Intrusion Prevention , 2005, RAID.
[31] Sushil Jajodia,et al. Abstraction-based misuse detection: high-level specifications and adaptable strategies , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[32] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[33] Daniel Massey,et al. On Detection of Anomalous Routing Dynamics in BGP , 2004, NETWORKING.
[34] Luigi V. Mancini,et al. A Host Intrusion Prevention System for Windows Operating Systems , 2004, ESORICS.
[35] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[36] Kamel Mohamed Faraoun,et al. Neural Networks Learning Improvement using the K-Means Clustering Algorithm to Detect Network Intrusions , 2007 .
[37] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[38] György J. Simon,et al. Data Mining for Cyber Security , 2006 .
[39] Sushil Jajodia,et al. Intrusion Detection Techniques , 2004 .
[40] Y. Weinsberg,et al. High performance string matching algorithm for a network intrusion prevention system (NIPS) , 2006, 2006 Workshop on High Performance Switching and Routing.
[41] E. Bloedorn,et al. Data mining for network intrusion detection : How to get started , 2001 .
[42] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[43] Wenbin Zheng,et al. Intrusion prevention system design , 2004 .
[44] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[45] Cristina L. Abad,et al. Log correlation for intrusion detection: a proof of concept , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[46] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[47] Wenbin Zheng,et al. Intrusion prevention system design , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[48] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[49] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[50] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[51] Michael Schatz,et al. A Real-Time Intrusion Detection System Based on Learning Program Behavior , 2000, Recent Advances in Intrusion Detection.
[52] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[53] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[54] Philip K. Chan,et al. Detecting novel attacks by identifying anomalous network packet headers , 2001 .
[55] Jingtao Yao,et al. A study on fuzzy intrusion detection , 2005, SPIE Defense + Commercial Sensing.
[56] Jiankun Hu,et al. A multi-layer model for anomaly intrusion detection using program sequences of system calls , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..
[57] Jeremy L. Jacob,et al. 1988 IEEE Symposium on Security and Privacy , 1988 .
[58] B. Maglaris,et al. A Distributed Intrusion Detection Prototype using Security Agents , 2004 .
[59] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[60] Ebrahim H. Mamdani,et al. An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..
[61] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[62] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[63] Ali Moeini,et al. NFIDS: a neuro-fuzzy intrusion detection system , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.
[64] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[65] Andreas Fuchsberger,et al. Intrusion Detection Systems and Intrusion Prevention Systems , 2005, Inf. Secur. Tech. Rep..
[66] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[67] Richard A. Kemmerer,et al. NSTAT: A Model-based Real-time Network Intrusion Detection System , 1998 .