McPAD: A multiple classifier system for accurate payload-based anomaly detection
暂无分享,去创建一个
Wenke Lee | Roberto Perdisci | Giorgio Giacinto | Davide Ariu | Prahlad Fogla | Wenke Lee | R. Perdisci | G. Giacinto | Davide Ariu | Prahlad Fogla
[1] Fabio Roli,et al. Intrusion detection in computer networks by a modular ensemble of one-class classifiers , 2008, Inf. Fusion.
[2] Salvatore J. Stolfo,et al. On the infeasibility of modeling polymorphic shellcode , 2007, CCS '07.
[3] Hajime Inoue,et al. Comparing Anomaly Detection Techniques for HTTP , 2007, RAID.
[4] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[5] Wenke Lee,et al. Evading network anomaly detection systems: formal reasoning and practical techniques , 2006, CCS '06.
[6] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[7] Wenke Lee,et al. Polymorphic Blending Attacks , 2006, USENIX Security Symposium.
[8] Subhash C. Bagui,et al. Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.
[9] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[10] Eric van den Berg,et al. A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows , 2005, RAID.
[11] Mehryar Mohri,et al. Confidence Intervals for the Area Under the ROC Curve , 2004, NIPS.
[12] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[13] Iván Arce,et al. The Shellcode Generation , 2004, IEEE Secur. Priv..
[14] Ludmila I. Kuncheva,et al. Combining Pattern Classifiers: Methods and Algorithms , 2004 .
[15] Luigi P. Cordella,et al. Network Intrusion Detection by a Multi-stage Classification System , 2004, Multiple Classifier Systems.
[16] Jörg Kindermann,et al. Text Categorization with Support Vector Machines. How to Represent Texts in Input Space? , 2002, Machine Learning.
[17] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[18] Fabio Roli,et al. Fusion of multiple classifiers for intrusion detection in computer networks , 2003, Pattern Recognit. Lett..
[19] Inderjit S. Dhillon,et al. A Divisive Information-Theoretic Feature Clustering Algorithm for Text Classification , 2003, J. Mach. Learn. Res..
[20] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.
[21] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[22] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[23] Fabrizio Sebastiani,et al. Machine learning in automated text categorization , 2001, CSUR.
[24] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[25] Robert P. W. Duin,et al. Combining One-Class Classifiers , 2001, Multiple Classifier Systems.
[26] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[27] David M. J. Tax,et al. One-class classification , 2001 .
[28] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[29] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[30] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[31] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[32] Thomas G. Dietterich. Ensemble Methods in Machine Learning , 2000, Multiple Classifier Systems.
[33] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[34] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[35] Thorsten Joachims,et al. Text categorization with support vector machines , 1999 .
[36] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[37] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[38] Josef Kittler,et al. Combining classifiers , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[39] Roberto Brunelli,et al. Person identification using multiple cues , 1995, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[40] David G. Stork,et al. Pattern Classification , 1973 .