A Nonparametric Multichart CUSUM Test for Rapid Intrusion Detection
暂无分享,去创建一个
[1] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[2] A. Shiryaev. On Optimum Methods in Quickest Detection Problems , 1963 .
[3] G. Lorden. PROCEDURES FOR REACTING TO A CHANGE IN DISTRIBUTION , 1971 .
[4] M. Pollak. Optimal Detection of a Change in Distribution , 1985 .
[5] D. Siegmund. Sequential Analysis: Tests and Confidence Intervals , 1985 .
[6] B. Brodsky,et al. Nonparametric Methods in Change Point Problems , 1993 .
[7] L. Gordon,et al. An Efficient Sequential Nonparametric Scheme for Detecting a Change of Distribution , 1994 .
[8] A. Tartakovsky. ASYMPTOTIC PROPERTIES OF CUSUM AND SHIRYAEV'S PROCEDURES FOR DETECTING A CHANGE IN A NONHOMOGENEOUS GAUSSIAN PROCESS , 1995 .
[9] Michèle Basseville,et al. Detection of Abrupt Changes: Theory and Applications. , 1995 .
[10] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Tze Leung Lai,et al. Information Bounds and Quick Detection of Parameter Changes in Stochastic Systems , 1998, IEEE Trans. Inf. Theory.
[12] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[13] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[14] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[15] S. Kent,et al. On the trail of intrusions into information systems , 2000 .
[16] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[17] B. Ravichandran,et al. Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[18] Alexander G. Tartakovsky,et al. A novel approach to detection of \denial{of{service" attacks via adaptive sequential and batch{sequential change{point detection methods , 2001 .
[19] Jonathan Lemon,et al. Resisting SYN Flood DoS Attacks with a SYN Cache , 2002, BSDCon.
[20] Symeon Papavassiliou,et al. Network intrusion and fault detection: a statistical anomaly approach , 2002, IEEE Commun. Mag..
[21] Edmond A. Jonckheere,et al. On the predictability of data network traffic , 2003, Proceedings of the 2003 American Control Conference, 2003..
[22] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[23] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[24] Masayuki Murata,et al. Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[25] Hongjoong Kim,et al. A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods , 2006, IEEE Transactions on Signal Processing.
[26] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[27] Rudolf B. Blazek,et al. Detection of intrusions in information systems by sequential change-point methods , 2005 .