Intrusion detection in enterprise systems by combining and clustering diverse monitor data
暂无分享,去创建一个
[1] Ravishankar K. Iyer,et al. Preemptive intrusion detection: theoretical framework and real-world measurements , 2015, HotSoS.
[2] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[3] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[4] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[5] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[6] Balachander Krishnamurthy,et al. Collaborating against common enemies , 2005, IMC '05.
[7] Vern Paxson,et al. Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context , 2005, DIMVA.
[8] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[9] Balachander Krishnamurthy,et al. Sketch-based change detection: methods, evaluation, and applications , 2003, IMC '03.
[10] Wanli Ma,et al. A study on the feature selection of network traffic for intrusion detection purpose , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[11] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[12] Chuanyi Ji,et al. Proactive network fault detection , 1997, Proceedings of INFOCOM '97.
[13] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[14] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[15] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[16] Ludovic Mé,et al. A Language Driven Intrusion Detection System for Event and Alert Correlation , 2004 .
[17] William K. Robertson,et al. Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks , 2013, ACSAC.
[18] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[19] P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .
[20] C. S. Hood,et al. Proactive network-fault detection [telecommunications] , 1997 .
[21] Erland Jonsson,et al. A Multi-Sensor Model to Improve Automated Attack Detection , 2008, RAID.