A Survey on Secure Network: Intrusion Detection & Prevention Approaches
暂无分享,去创建一个
[1] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Shyam Nandan Kumar. DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds , 2015 .
[3] Carlos García Garino,et al. An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..
[4] Victor Valeriu Patriciu,et al. Intrusions detection based on Support Vector Machine optimized with swarm intelligence , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).
[5] A. Qayyum,et al. Taxonomy of statistical based anomaly detection techniques for intrusion detection , 2005, Proceedings of the IEEE Symposium on Emerging Technologies, 2005..
[6] Hiroki Takakura,et al. Toward a more practical unsupervised anomaly detection system , 2013, Inf. Sci..
[7] C. F. Chong,et al. IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..
[9] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[10] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[11] I. Monitor. Information Security Management Handbook , 2000 .
[12] Chia-Ming Chang,et al. An active network-based intrusion detection and response systems , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[13] Tae-Young Choe,et al. Distributed Processing of Snort Alert Log using Hadoop , 2013 .
[14] Gang Zhao,et al. Analysis about Performance of Multiclass SVM Applying in IDS , 2013 .
[15] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[16] Oludele Awodele,et al. A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) , 2009 .
[17] Dipika Narsingyani,et al. Optimizing false positive in anomaly based intrusion detection using Genetic algorithm , 2015, 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE).
[18] Shyam Nandan Kumar. Cryptography during Data Sharing and Accessing Over Cloud , 2015 .
[19] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[20] Karl N. Levitt,et al. The Design of GrIDS: A Graph-Based Intrusion Detection System , 2007 .
[21] Petra Holtzmann. Ccna Security Study Guide Exam 640 553 , 2016 .
[22] Venu Govindaraju,et al. Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.
[23] David R. Miller,et al. Security Information and Event Management , 2010 .
[24] Siyang Zhang,et al. A novel hybrid KPCA and SVM with GA model for intrusion detection , 2014, Appl. Soft Comput..
[25] Zhiyuan Ma,et al. Autonomous mobile agent based intrusion detection framework in wireless body area networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[26] Kumar Das. Protocol Anomaly Detection for Network-based Intrusion Detection , 2002 .
[27] Fatin Norsyafawati Mohd Sabri,et al. Identifying False Alarm Rates for Intrusion Detection System with Data Mining , 2011 .
[28] Vikram Chopra,et al. A Novel Approach for Intrusion Detection , 2011 .
[29] Cheng-Zen Yang,et al. Design of an Active Intrusion Monitor System , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[30] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[31] Wei Xu,et al. Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..
[32] Shyam Nandan Kumar,et al. Review on Network Security and Cryptography , 2015 .
[33] Shyam Nandan Kumar,et al. World towards Advance Web Mining: A Review , 2015 .
[34] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[35] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[36] Sherif Abdelwahed,et al. HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[37] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[38] Abdelkarim Erradi,et al. A hierarchical, autonomous, and forecasting cloud IDS , 2013, 2013 5th International Conference on Modelling, Identification and Control (ICMIC).
[39] Masahiko Takenaka,et al. TOPASE: Detection of brute force attacks used disciplined IPs from IDS log , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[40] Chuanhe Huang,et al. Selection of Candidate Support Vectors in incremental SVM for network intrusion detection , 2014, Comput. Secur..
[41] Abdullah Sharaf Alghamdi,et al. Remote to Local attack detection using supervised neural network , 2010, 2010 International Conference for Internet Technology and Secured Transactions.
[42] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[43] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[44] Amit Vajpayee,et al. ASP: Advanced Security Protocol for Security and Privacy in Cloud Computing , 2016 .
[45] Min Du,et al. Secure Vault: An Intrusion Prevention Model for Ender-Users , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[46] Khattab M. Ali Alheeti,et al. Hybrid intrusion detection in connected self-driving vehicles , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).
[47] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[48] Guo Fan,et al. Polymorphic worms signature extraction based-on improved ant colony algorithm , 2014, 2014 9th International Conference on Computer Science & Education.
[49] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[50] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[51] E. Eugene Schultz. Security Information and Event Management (SIEM) , 2011, Encyclopedia of Information Assurance.
[52] Ilsun You,et al. Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions , 2012, 2012 15th International Conference on Network-Based Information Systems.
[53] Hajime Shimada,et al. Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval , 2014, ICONIP.
[54] Salvatore J. Stolfo,et al. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems , 2002 .
[55] M. Abliz. Internet Denial of Service Attacks and Defense Mechanisms , 2011 .
[56] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[57] Alaa Hussein Al-Hamami,et al. Developing a Host Intrusion Prevention System by Using Data Mining , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[58] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[59] Monther Aldwairi,et al. Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).
[60] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[61] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[62] A. Midzic,et al. Intrusion detection system modeling based on neural networks and fuzzy logic , 2016, 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES).
[63] Yasser Yasami,et al. A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods , 2010, The Journal of Supercomputing.
[64] Eugene H. Spafford,et al. IDIOT - Users Guide , 1996 .
[65] Youngseok Lee,et al. Toward scalable internet traffic measurement and analysis with Hadoop , 2013, CCRV.
[66] Steven R. Snapp,et al. The DIDS (Distributed Intrusion Detection System) Prototype , 1992, USENIX Summer.
[67] Muhammad Hussain,et al. Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components , 2014, Neural Computing and Applications.
[68] Octavio Nieto-Taladriz,et al. Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).
[69] Maninder Singh,et al. PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.
[70] Saadiah Yahya,et al. A hybrid intrusion detection system based on different machine learning algorithms , 2013 .
[71] Ester Yen,et al. Data mining-based intrusion detectors , 2009, Expert Syst. Appl..
[72] Amit Vajpayee,et al. A Survey on Secure Cloud: Security and Privacy in Cloud Computing , 2016 .
[73] R. Newman. Computer Security: Protecting Digital Resources , 2009 .
[74] Shyam Nandan Kumar. Technique for Security of Multimedia using Neural Network , 2014 .