1-1-2013 Network Intrusion Detection and Mitigation Against Denial of Service Attack
暂无分享,去创建一个
[1] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[3] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[4] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[5] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[6] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[7] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[8] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[9] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[10] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[11] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[12] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[13] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[14] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[15] Sushil Jajodia,et al. ADAM: Detecting Intrusions by Data Mining , 2001 .
[16] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[17] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[18] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[19] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[20] S. Agarwal,et al. DDoS Mitigation via Regional Cleaning Centers , 2003 .
[21] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[22] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[23] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[24] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[25] J. Crowcroft,et al. Honeycomb: creating intrusion detection signatures using honeypots , 2004, Comput. Commun. Rev..
[26] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM '04.
[27] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[28] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[29] Sotiris Ioannidis,et al. Gnort: High Performance Network Intrusion Detection Using Graphics Processors , 2008, RAID.
[30] Xinming Ou,et al. Classification of UDP Traffic for DDoS Detection , 2012, LEET.
[31] Sungryoul Lee,et al. Kargus: a highly-scalable software-based intrusion detection system , 2012, CCS.