Anomalous packet identification for network intrusion detection
暂无分享,去创建一个
[1] Victor A. Skormin,et al. Detecting Malicious Codes by the Presence of Their "Gene of Self-replication" , 2003, MMM-ACNS.
[2] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[3] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[4] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[5] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[6] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[7] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[8] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.
[9] R. Sekar,et al. An Approach for Detecting Self-propagating Email Using Anomaly Detection , 2003, RAID.
[10] Jim Alves-Foss,et al. NATE: Network Analysis ofAnomalousTrafficEvents, a low-cost approach , 2001 .
[11] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[12] José G. Delgado-Frias,et al. A VLSI interconnection network router using a D-CAM with hidden refresh , 1996, Proceedings of the Sixth Great Lakes Symposium on VLSI.
[13] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[14] Jim Alves-Foss,et al. NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach , 2001, NSPW '01.
[15] Stamatis Vassiliadis,et al. A Flexible Bit-Pattern Associative Router for Interconnection Networks , 1996, IEEE Trans. Parallel Distributed Syst..