A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
暂无分享,去创建一个
[1] Carsten Lund,et al. Flow sampling under hard resource constraints , 2004, SIGMETRICS '04/Performance '04.
[2] Carsten Lund,et al. Properties and prediction of flow statistics from sampled packet streams , 2002, IMW '02.
[3] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[4] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[5] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[7] Nei Kato,et al. A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics , 2005, CIS.
[8] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.
[9] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[10] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[11] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[12] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[13] Evangelos P. Markatos,et al. Efficient content-based detection of zero-day worms , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.