Payoff Based IDS Evaluation
暂无分享,去创建一个
[1] Vinod Yegneswaran,et al. An Attacker-Defender Game for Honeynets , 2009, COCOON.
[2] John S. Baras,et al. A framework for the evaluation of intrusion detection systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] John E. Gaffney,et al. Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[4] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[5] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[6] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[7] N. Marchang,et al. A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[8] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[9] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[10] Carrie Gates,et al. Challenging the anomaly detection paradigm: a provocative discussion , 2006, NSPW '06.
[11] Carrie Gates,et al. More Netflow Tools for Performance and Security , 2004, LISA.
[12] Michael K. Reiter,et al. On the Limits of Payload-Oblivious Network Attack Detection , 2008, RAID.