Anomaly-based network intrusion detection: Techniques, systems and challenges
暂无分享,去创建一个
G. Maciá-Fernández | P. Garcı́a-Teodoroa | J. Dı́az-Verdejoa | G. Maciá-Fernándeza | E. Vázquezb | P. García-Teodoro | J. D. Verdejo | E. Vázquez
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[2] Gregory Piatetsky-Shapiro,et al. The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.
[3] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[4] Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey , 1998 .
[5] Stuart Staniford-chen,et al. The Common Intrusion Detection Framework - Data Formats , 1998 .
[6] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[7] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[8] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[9] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[10] John Mhugh. The 1998 Lincoln Laboratory IDS evaluation : A critique , 2000 .
[11] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[12] John E. Gaffney,et al. Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[14] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[15] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[16] V. Rao Vemuri,et al. Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..
[17] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[18] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[19] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[20] Juan E. Tapiador,et al. Stochastic protocol modeling for anomaly based network intrusion detection , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[21] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[22] Juan E. Tapiador,et al. Anomaly detection methods in wired networks: a survey and taxonomy , 2004, Comput. Commun..
[23] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[24] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[25] Roberto Battiti,et al. Identifying intrusions in computer networks with principal component analysis , 2006, First International Conference on Availability, Reliability and Security (ARES'06).