A NetFlow based flow analysis and monitoring system in enterprise networks
暂无分享,去创建一个
[1] Viktor K. Prasanna,et al. High-throughput linked-pattern matching for intrusion detection systems , 2005, 2005 Symposium on Architectures for Networking and Communications Systems (ANCS).
[2] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Seung-Won Shin,et al. D-SAT: detecting SYN flooding attack by two-stage statistical approach , 2005, The 2005 Symposium on Applications and the Internet.
[4] Daniel Q. Naiman. Statistical anomaly detection via httpd data analysis , 2004, Comput. Stat. Data Anal..
[5] B. Ravichandran,et al. Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[6] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[7] Sally Floyd,et al. Wide-area traffic: the failure of Poisson modeling , 1994 .
[8] Chin-Tser Huang,et al. Wavelet-based Real Time Detection of Network Traffic Anomalies , 2006, 2006 Securecomm and Workshops.
[9] Andrew H. Sung,et al. Monitoring System Security Using Neural Networks and Support Vector Machines , 2001, HIS.
[10] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[11] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[12] Shiuh-Pyng Shieh,et al. On a Pattern-Oriented Model for Intrusion Detection , 1997, IEEE Trans. Knowl. Data Eng..
[13] H. Jonathan Chao,et al. TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[14] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[15] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[16] B. Brodsky,et al. Nonparametric Methods in Change Point Problems , 1993 .
[17] Azzedine Boukerche,et al. Human immune anomaly and misuse based detection for computer system operations: part II , 2003, Proceedings International Parallel and Distributed Processing Symposium.
[18] Anja Feldmann,et al. Dynamics of IP traffic: a study of the role of variability and the impact of control , 1999, SIGCOMM '99.
[19] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[20] Thomas M. Chen. Intrusion Detection for Viruses and Worms , 2004 .
[21] I. Damgård,et al. The protocols. , 1989, The New Zealand nursing journal. Kai tiaki.
[22] C.J. Coit,et al. Towards faster string matching for intrusion detection or exceeding the speed of Snort , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[23] Jan van Lunteren,et al. High-Performance Pattern-Matching for Intrusion Detection , 2006, INFOCOM.
[24] M.N.O. Sadiku,et al. WAID: wavelet analysis intrusion detection , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..
[25] W. Richard Stevens,et al. TCP/IP Illustrated, Volume 1: The Protocols , 1994 .
[26] Fumio Mizoguchi,et al. Design of security system based on immune system , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.
[27] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, GLOBECOM.
[28] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[29] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[30] Shiuh-Pyng Shieh,et al. A pattern-oriented intrusion-detection model and its applications , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[31] Timothy Sherwood,et al. Architectures for Bit-Split String Scanning in Intrusion Detection , 2006, IEEE Micro.
[32] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[33] Li Jun,et al. HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[34] Kotagiri Ramamohanarao,et al. Detecting reflector attacks by sharing beliefs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[35] Ann Q. Gates,et al. TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2005 .
[36] B. Plattner,et al. A framework for real-time worm attack detection and backbone monitoring , 2005, First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05).
[37] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[38] Ming Li,et al. Decision analysis of network-based intrusion detection systems for denial-of-service attacks , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).
[39] Bernhard Plattner,et al. Host behaviour based early detection of worm outbreaks in Internet backbones , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[40] Michèle Basseville,et al. Detection of abrupt changes: theory and application , 1993 .
[41] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[42] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.