Anomaly detection methods in wired networks
暂无分享,去创建一个
[1] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[2] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[3] Philip K. Chan,et al. Detecting novel attacks by identifying anomalous network packet headers , 2001 .
[4] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[5] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[6] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[7] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[9] kc claffy,et al. Internet traffic flow profiling , 1994 .
[10] Vern Paxson,et al. Empirically derived analytic models of wide-area TCP connections , 1994, TNET.
[11] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[12] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[13] B. Ravichandran,et al. Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[14] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[15] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[16] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[17] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[18] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[19] George F. Riley,et al. Intrusion detection testing and benchmarking methodologies , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[20] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[21] Steven M. Bellovin,et al. Packets found on an internet , 1993, CCRV.
[22] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[23] Zheng Zhang,et al. Architecture of Generalized Network Service Anomaly and Fault Thresholds , 2001, MMNS.
[24] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[25] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[26] Paul Barford,et al. Characteristics of network traffic flow anomalies , 2001, IMW '01.
[27] Peter G. Neumann,et al. IDES: A Progress Report , 1990 .
[28] P. J. Criscuolo. Distributed Denial of Service Tools, Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht. , 2000 .
[29] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[30] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[31] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .