Design and Implementation of an Anomaly Detection System: an Empirical Approach
暂无分享,去创建一个
[1] Mark W. Sylor,et al. Using Time over Threshold to Reduce Noise in Performance and Fault Management Systems , 2000, DSOM.
[2] Luca Deri,et al. Monitoring networks using ntop , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[3] Keith McCloghrie,et al. Management Information Base for network management of TCP/IP-based internets , 1990, RFC.
[4] Kathleen A. Jackson. INTRUSION DETECTION SYSTEM (IDS) PRODUCT SURVEY , 1999 .
[5] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[6] Marcus J. Ranum,et al. Implementing a generalized tool for network monitoring , 1997, Inf. Secur. Tech. Rep..
[7] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[8] Matthew C. Kolon,et al. Juniper Networks Routers: The Complete Reference , 2002 .
[9] Joseph L. Hellerstein,et al. Rule Induction of Computer Events , 2001, DSOM.
[10] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[11] Steven Waldbusser,et al. Remote Network Monitoring Management Information Base , 1995, RFC.
[12] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[13] David Plonka,et al. FlowScan: A Network Traffic Flow Reporting and Visualization Tool , 2000, LISA.
[14] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .