Identifying network traffic features suitable for honeynet data analysis
暂无分享,去创建一个
[1] Xenofontas A. Dimitropoulos,et al. Histogram-based traffic anomaly detection , 2009, IEEE Transactions on Network and Service Management.
[2] George Nychis,et al. An Empirical Evaluation of Entropy-based Anomaly Detection , 2007 .
[3] Qi Shi,et al. DiDDeM: a system for early detection of TCP SYN flood attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[4] Shunji Abe,et al. Detecting DoS attacks using packet size distribution , 2007, 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems.
[5] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[6] Henry L. Owen,et al. The use of Honeynets to detect exploited systems across large enterprise networks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[7] Marc Dacier,et al. A framework for attack patterns' discovery in honeynet data , 2008 .
[8] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[9] Antonio Pescapè,et al. NIS04-1: Wavelet-based Detection of DoS Attacks , 2006, IEEE Globecom 2006.