Modeling NIDS Evasion with Genetic Programming
暂无分享,去创建一个
[1] Vern Paxson,et al. Active mapping: resisting NIDS evasion without altering traffic , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] Andrew H. Sung,et al. Modeling intrusion detection systems using linear genetic programming approach , 2004 .
[3] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .
[4] George Varghese,et al. Detecting evasion attacks at high speeds without reassembly , 2006, SIGCOMM 2006.
[5] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[6] David M. Watson,et al. Protocol scrubbing: network security through transparent flow modification , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[8] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[9] George Varghese,et al. Detecting evasion attacks at high speeds without reassembly , 2006, SIGCOMM.
[10] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[11] Eugene H. Spafford,et al. Applying Genetic Programming to Intrusion Detection , 1995 .
[12] Giandomenico Spezzano,et al. GP Ensemble for Distributed Intrusion Detection Systems , 2005, ICAPR.
[13] Chih-Hung Lin,et al. A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems , 2008, DIMVA.
[14] John R. Koza,et al. Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.
[15] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[16] Stefano Giordano,et al. Counting bloom filters for pattern matching and anti-evasion at the wire speed , 2009, IEEE Network.
[17] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[18] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[19] Hari Balakrishnan,et al. Efficient and Robust TCP Stream Normalization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[20] Andrew H. Sung,et al. Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach , 2004, IEA/AIE.
[21] Arturo Ribagorda,et al. Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming , 2010, 2010 International Conference on Availability, Reliability and Security.
[22] Juan E. Tapiador,et al. Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming , 2009, EvoWorkshops.