Effective Anomaly Detection with Scarce Training Data
暂无分享,去创建一个
Christopher Krügel | Giovanni Vigna | William K. Robertson | Federico Maggi | Christopher Krügel | Giovanni Vigna | F. Maggi
[1] L. R. Rabiner,et al. A probabilistic distance measure for hidden Markov models , 1985, AT&T Technical Journal.
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Andreas Stolcke,et al. Hidden Markov Model} Induction by Bayesian Model Merging , 1992, NIPS.
[4] Andreas Stolcke,et al. Inducing Probabilistic Grammars by Bayesian Model Merging , 1994, ICGI.
[5] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Christian N. S. Pedersen,et al. Metrics and Similarity Measures for Hidden Markov Models , 1999, ISMB.
[7] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[8] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[9] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[10] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[12] Philip K. Chan,et al. Detecting novel attacks by identifying anomalous network packet headers , 2001 .
[13] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[14] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[15] Christopher Krügel,et al. Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[16] Salvatore J. Stolfo,et al. Learning Rules from System Call Arguments and Sequences for Anomaly 20 Detection , 2003 .
[17] Pradeep Ravikumar,et al. A Comparison of String Distance Metrics for Name-Matching Tasks , 2003, IIWeb.
[18] Nicole A. Lazar,et al. Statistical Analysis With Missing Data , 2003, Technometrics.
[19] Philip K. Chan,et al. Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.
[20] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[21] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[22] Sung Deok Cha,et al. SAD: web session anomaly detection based on parameter estimation , 2004, Comput. Secur..
[23] Philip K. Chan,et al. MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences , 2004, VizSEC/DMSEC '04.
[24] Rui Xu,et al. Survey of clustering algorithms , 2005, IEEE Transactions on Neural Networks.
[25] Somesh Jha,et al. Environment-Sensitive Intrusion Detection , 2005, RAID.
[26] Christopher Krügel,et al. A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.
[27] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[28] R. Sekar,et al. Dataflow anomaly detection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[29] H. J. Escalante,et al. Kernel Methods for Anomaly Detection and Noise Elimination , 2006 .
[30] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[31] Christopher Krügel,et al. Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks , 2006, NDSS.
[32] Salvatore J. Stolfo,et al. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[33] Sun-il Kim,et al. Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[34] Liang Guangmin. Modeling Unknown Web Attacks in Network Anomaly Detection , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[35] Salvatore J. Stolfo,et al. Casting out Demons: Sanitizing Training Data for Anomaly Sensors , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[36] Salvatore J. Stolfo,et al. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic , 2009, NDSS.
[37] Stefano Zanero,et al. Detecting Intrusions through System Call Sequence and Argument Analysis , 2010, IEEE Transactions on Dependable and Secure Computing.
[38] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..