A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
暂无分享,去创建一个
Xiangjian He | Zhiyuan Tan | Priyadarsi Nanda | Ren Ping Liu | Aruna Jamdagni | R. Liu | Zhiyuan Tan | Xiangjian He | P. Nanda | Aruna Jamdagni
[1] Shaoning Pang,et al. Hierarchical Core Vector Machines for Network Intrusion Detection , 2009, ICONIP.
[2] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[3] Ali A. Ghorbani,et al. A Novel Covariance Matrix Based Approach for Detecting Network Anomalies , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[4] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[5] James R. Gattiker,et al. Computer Intrusion Detection with Classification and Anomaly Detection, Using SVMs , 2003, Int. J. Pattern Recognit. Artif. Intell..
[6] Symeon Papavassiliou,et al. Network intrusion and fault detection: a statistical anomaly approach , 2002, IEEE Commun. Mag..
[7] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[8] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[9] James Kay. Viruses: Low volume viruses: new tools for criminals , 2005 .
[10] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[11] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[12] R. Power. CSI/FBI computer crime and security survey , 2001 .
[13] D. S. Yeung,et al. Network intrusion detection in covariance feature space , 2007, Pattern Recognit..
[14] Xiangjian He,et al. Intrusion detection using GSAD model for HTTP traffic on web services , 2010, IWCMC.
[15] Morteza Amini,et al. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..
[16] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[17] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[18] S. T. Sarasamma,et al. Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[19] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[20] Ki Hoon Kwon,et al. DDoS attack detection method using cluster analysis , 2008, Expert Syst. Appl..
[21] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[22] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[23] David Page,et al. KDD Cup 2001 report , 2002, SKDD.