Anomaly-based network intrusion detection: Techniques, systems and challenges
暂无分享,去创建一个
Gabriel Maciá-Fernández | Jesús E. Díaz-Verdejo | Pedro García-Teodoro | Enrique Vázquez | G. Maciá-Fernández | P. García-Teodoro | J. D. Verdejo | E. Vázquez
[1] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[2] Mohammed J. Zaki,et al. ADMIT: anomaly-based data mining for intrusions , 2002, KDD.
[3] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[4] Anthony Gargaro,et al. Reusability Issues and Ada , 1987, IEEE Software.
[5] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[6] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[7] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[8] V. Rao Vemuri,et al. Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..
[9] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[10] Biswanath Mukherjee,et al. A Software Platform for Testing Intrusion Detection Systems , 1997, IEEE Softw..
[11] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[12] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[13] John E. Gaffney,et al. Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[15] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[16] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[17] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[18] Mostafa H. Ammar,et al. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme , 2004, Comput. Networks.
[19] Richard H. Eckhouse. The computer science laboratory , 1972, SIGCSE '72.
[20] Christopher Krügel,et al. Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[21] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[22] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[23] Edson dos Santos Moreira,et al. Network intrusion detection using neural networks , 1997 .
[24] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[25] Stuart Staniford-chen,et al. The Common Intrusion Detection Framework - Data Formats , 1998 .
[26] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[27] John McHugh,et al. The 1998 Lincoln Laboratory IDS Evaluation , 2000, Recent Advances in Intrusion Detection.
[28] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[29] Jesse C. Rabek,et al. LARIAT: Lincoln adaptable real-time information assurance testbed , 2002, Proceedings, IEEE Aerospace Conference.
[30] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[31] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[32] María Bermúdez-Edo,et al. Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems , 2006, CRITIS.
[33] David Heckerman,et al. A Tutorial on Learning with Bayesian Networks , 1999, Innovations in Bayesian Networks.
[34] Juan E. Tapiador,et al. Anomaly detection methods in wired networks: a survey and taxonomy , 2004, Comput. Commun..
[35] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[36] George F. Riley,et al. Intrusion detection testing and benchmarking methodologies , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[37] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[38] Roberto Battiti,et al. Identifying intrusions in computer networks with principal component analysis , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[39] Jaideep Srivastava,et al. Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) , 2005 .
[40] Gregory Piatetsky-Shapiro,et al. The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.
[41] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[42] Vic Barnett,et al. Outliers in Statistical Data , 1980 .
[43] John Mhugh. The 1998 Lincoln Laboratory IDS evaluation : A critique , 2000 .
[44] Christopher Krügel,et al. Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[45] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[46] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD 2000.
[47] Juan E. Tapiador,et al. Stochastic protocol modeling for anomaly based network intrusion detection , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[48] Juan E. Tapiador,et al. Detection of Web-based attacks through Markovian protocol parsing , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[49] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.