A Statistical Analysis of Attack Data to Separate Attacks
暂无分享,去创建一个
Robin Berthier | Michel Cukier | Susmit Panjwani | Stephanie Tan | R. Berthier | M. Cukier | S. Panjwani | Stephanie Tan
[1] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[2] Xuxian Jiang,et al. Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms , 2005 .
[3] Dominik Heckmann,et al. Weka: Practical machine learning tools and techniques with Java implementations , 2007 .
[4] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[5] Van-Hau Pham,et al. Collection and analysis of attack data based on honeypots deployed on the Internet , 2006, Quality of Protection.
[6] Ian H. Witten,et al. Weka: Practical machine learning tools and techniques with Java implementations , 1999 .
[7] Michel Cukier,et al. An experimental evaluation to determine if port scans are precursors to an attack , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[8] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[9] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .
[10] Fabien Pouget,et al. Honeypot-based forensics , 2004 .
[11] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .