Improving Performance of Mobile Agent Based Intrusion Detection System
暂无分享,去创建一个
[1] Bhushan H. Trivedi,et al. Reducing Features of KDD CUP 1999 Dataset for Anomaly Detection Using Back Propagation Neural Network , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
[2] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[3] Yoshihiro Oyama,et al. Anomaly-Based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.
[4] Jerzy W. Rozenblit,et al. A hybrid intrusion detection and visualization system , 2006, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06).
[5] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[6] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[7] Eugene H. Spafford,et al. Intrusion detection using autonomous agents , 2000, Comput. Networks.
[8] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[9] Raouf Boutaba,et al. Applying kernel methods to anomaly based intrusion detection systems , 2009, 2009 Global Information Infrastructure Symposium.
[10] Hassan Artail,et al. A New Mobile Agent-Based Intrusion Detection System Using Distributed Sensors , 2004 .
[11] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[12] Sung Deok Cha,et al. Masquerade detection based on SVM and sequence-based user commands profile , 2007, ASIACCS '07.
[13] U. Akyazi,et al. Distributed intrusion detection using mobile agents against DDoS attacks , 2008, 2008 23rd International Symposium on Computer and Information Sciences.
[14] Lu Song-nian. Research of distributed intrusion detection system based on mobile agent , 2006 .
[15] Boleslaw K. Szymanski,et al. Intrusion detection: a bioinformatics approach , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[16] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[17] Jianxiao Liu,et al. A Distributed Intrusion Detection System Based on Agents , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[18] Adesina Simon Sodiya,et al. Multi-Level and Secured Agent-Based Intrusion Detection System , 2006, J. Comput. Inf. Technol..
[19] Pieter H. Hartel,et al. POSEIDON: a 2-tier anomaly-based network intrusion detection system , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).
[20] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[21] Chundong Wang,et al. A Distributed Intrusion Detection System Based on Mobile Agents , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.
[22] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[23] Jing Xu,et al. A New Distributed Intrusion Detection Model Based on Immune Mobile Agent , 2009, 2009 Asia-Pacific Conference on Information Processing.
[24] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[25] R. J. Zheng,et al. Mobile Agents for Network Intrusion Resistance , 2006, APWeb Workshops.
[26] Chhaya Das,et al. Analysis of Distributed Intrusion Detection Systems Using Mobile Agents , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[27] A. Chehab,et al. An Adaptive Intrusion Detection and Defense System based on Mobile Agents , 2004 .
[28] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[29] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[30] Yingbing Yu,et al. A survey of anomaly intrusion detection techniques , 2012 .
[31] H. S. Teng,et al. Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[32] Jing Xu,et al. Immune Mobile Agent and Its Application in IDS , 2013 .
[33] B. Djemaa,et al. Intrusion detection system: Hybrid approach based mobile agent , 2012, International Conference on Education and e-Learning Innovations.
[34] Chengqi Zhang,et al. MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agent , 2004 .
[35] Christopher Krügel,et al. Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks , 2001 .
[36] Bhavin Shah,et al. Artificial Neural Network based Intrusion Detection System: A Survey , 2012 .
[37] Gunar E. Liepins,et al. Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[38] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[39] Christopher Krügel,et al. Applying Mobile Agent Technology to Intrusion Detection , 2001 .