A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks
暂无分享,去创建一个
[1] DiotChristophe,et al. Diagnosing network-wide traffic anomalies , 2004 .
[2] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[3] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[4] Jake D. Brutlag,et al. Aberrant Behavior Detection in Time Series for Network Monitoring , 2000, LISA.
[5] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[6] Anil K. Jain. Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..
[7] Ana L. N. Fred,et al. Combining multiple clusterings using evidence accumulation , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[9] Huan Liu,et al. Subspace clustering for high dimensional data: a review , 2004, SKDD.
[10] Jennifer Rexford,et al. Sensitivity of PCA for traffic anomaly detection , 2007, SIGMETRICS '07.
[11] Ramesh Govindan,et al. Detection and identification of network anomalies using sketch subspaces , 2006, IMC '06.
[12] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[13] Nita V. Jaiswal. Unsupervised Network Anomaly Detection , 2013 .
[14] Philippe Owezarski,et al. Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection , 2011, 2011 7th International Conference on Network and Service Management.
[15] Robin Berthier,et al. Nfsight: netflow-based network awareness tool , 2010 .
[16] Joydeep Ghosh,et al. Cluster Ensembles --- A Knowledge Reuse Framework for Combining Multiple Partitions , 2002, J. Mach. Learn. Res..
[17] Dimitrios Gunopulos,et al. Automatic subspace clustering of high dimensional data for data mining applications , 1998, SIGMOD '98.
[18] Christopher Leckie,et al. Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.
[19] Balachander Krishnamurthy,et al. Sketch-based change detection: methods, evaluation, and applications , 2003, IMC '03.
[20] Pedro Casas,et al. Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements , 2010, Comput. Networks.
[21] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[22] Philippe Owezarski,et al. UNADA: Unsupervised Network Anomaly Detection Using Sub-space Outliers Ranking , 2011, Networking.
[23] Graham Cormode,et al. What's new: finding significant differences in network data streams , 2004, IEEE/ACM Transactions on Networking.
[24] Fernando Silveira,et al. URCA: Pulling out Anomalies by their Root Causes , 2010, 2010 Proceedings IEEE INFOCOM.
[25] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[26] Philippe Owezarski,et al. Automated Classification of Network Traffic Anomalies , 2009, SecureComm.