A Supplementary Method for Malicious Detection Based on HTTP-Activity Similarity Features
暂无分享,去创建一个
[1] Michael Kirchner. A framework for detecting anomalies in HTTP traffic using instance-based learning and k-nearest neighbor classification , 2010, 2010 2nd International Workshop on Security and Communication Networks (IWSCN).
[2] S. Verma,et al. Web usage pattern analysis through web logs: A review , 2012, 2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE).
[3] Cai Jun,et al. The structure analysis of user behaviors for web traffic , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[4] Rui Xu,et al. Survey of clustering algorithms , 2005, IEEE Transactions on Neural Networks.
[5] Areej Al-Bataineh,et al. Analysis and detection of malicious data exfiltration in web traffic , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[6] F. Amblard,et al. WHICH TIES TO CHOOSE? A SURVEY OF SOCIAL NETWORKS MODELS FOR AGENT-BASED SOCIAL SIMULATIONS , 2002 .
[7] Christian Biemann,et al. Chinese Whispers - an Efficient Graph Clustering Algorithm and its Application to Natural Language Processing Problems , 2006 .
[8] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[9] Sung-Hyuk Cha. Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions , 2007 .