Feature Selection for Detecting Fast Attack in Network Intrusion Detection
暂无分享,去创建一个
[1] Fabio Roli,et al. Fusion of multiple classifiers for intrusion detection in computer networks , 2003, Pattern Recognit. Lett..
[2] Wenke Lee,et al. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems , 1999 .
[3] Joohan Lee,et al. Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND) , 2006, ACM-SE 44.
[4] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[5] Salvatore J. Stolfo,et al. Surveillance detection in high bandwidth environments , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[6] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[7] Konstantina Papagiannaki,et al. Toward the Accurate Identification of Network Applications , 2005, PAM.
[8] Rasool Jalili,et al. Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.
[9] A. Shukla,et al. TCP Connection Management Mechanisms for Improving Internet Server Performance , 2006, 2006 1st IEEE Workshop on Hot Topics in Web Systems and Technologies.
[10] Ali A. Ghorbani,et al. Toward a feature classification scheme for network intrusion detection , 2006, 4th Annual Communication Networks and Services Research Conference (CNSR'06).
[11] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[12] John McHugh,et al. The Role of Intrusion Detection Systems , 2000 .
[13] Ian Diamond,et al. Analysis of Binary Data. 2nd Edn. , 1990 .
[14] M. A. Maarof,et al. Feature Selection Using Rough Set in Intrusion Detection , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.
[15] Y. Wang,et al. Model of Network Intrusion Detection System based on BP Algorithm , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.
[16] Joohan Lee,et al. Packet- vs. session-based modeling for intrusion detection systems , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[17] Marco Mellia,et al. TCP Anomalies: Identification And Analysis , 2006 .
[18] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[19] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[20] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[21] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[22] Karl N. Levitt. Intrusion detection: current capabilities and future directions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..