A close look on n-grams in intrusion detection: anomaly detection vs. classification
暂无分享,去创建一个
Konrad Rieck | Christian Wressnegger | Guido Schwenk | Daniel Arp | Dan Arp | Christian Wressnegger | Guido Schwenk | Konrad Rieck
[1] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[2] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[3] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[5] Christopher Krügel,et al. On the Detection of Anomalous System Call Arguments , 2003, ESORICS.
[6] Christopher Krügel,et al. A Static, Packer-Agnostic Filter to Detect Similar Malware Samples , 2012, DIMVA.
[7] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[8] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[9] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[10] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[11] Wenke Lee,et al. McPAD: A multiple classifier system for accurate payload-based anomaly detection , 2009, Comput. Networks.
[12] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[13] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[14] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[15] W. B. Cavnar,et al. N-gram-based text categorization , 1994 .
[16] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[17] Wenke Lee,et al. Classification of packed executables for accurate computer virus detection , 2008, Pattern Recognit. Lett..
[18] Konrad Rieck,et al. Autonomous learning for detection of JavaScript attacks: vision or reality? , 2012, AISec '12.
[19] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[20] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[21] Sandro Etalle,et al. N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols , 2012, RAID.
[22] Vern Paxson,et al. A high-level programming environment for packet trace anonymization and transformation , 2003, SIGCOMM '03.
[23] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] John Langford,et al. Hash Kernels for Structured Data , 2009, J. Mach. Learn. Res..
[25] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[26] Carrie Gates,et al. Challenging the anomaly detection paradigm: a provocative discussion , 2006, NSPW '06.
[27] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[28] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[29] Wenke Lee,et al. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[30] Kymie M. C. Tan,et al. "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[31] M Damashek,et al. Gauging Similarity with n-Grams: Language-Independent Categorization of Text , 1995, Science.
[32] Andreas Dewald,et al. ADSandbox: sandboxing JavaScript to fight malicious websites , 2010, SAC '10.
[33] Andreas Dewald,et al. Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik C UJO : Efficient Detection and Prevention of Drive-by-Download Attacks , 2010 .
[34] Pavel Laskov,et al. Static detection of malicious JavaScript-bearing PDF documents , 2011, ACSAC '11.
[35] Hajime Inoue,et al. Comparing Anomaly Detection Techniques for HTTP , 2007, RAID.
[36] David Brumley,et al. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions , 2012, 2012 IEEE Symposium on Security and Privacy.
[37] Nello Cristianini,et al. Kernel Methods for Pattern Analysis , 2003, ICTAI.
[38] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[39] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[40] Arun K. Pujari,et al. N-gram analysis for computer virus detection , 2006, Journal in Computer Virology.
[41] Konrad Rieck,et al. Detecting Unknown Network Attacks Using Language Models , 2006, DIMVA.
[42] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[43] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[44] Salvatore J. Stolfo,et al. Casting out Demons: Sanitizing Training Data for Anomaly Sensors , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[45] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[46] Wenke Lee,et al. Polymorphic Blending Attacks , 2006, USENIX Security Symposium.
[47] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[48] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[49] Alexander J. Smola,et al. Learning with kernels , 1998 .
[50] Ching Y. Suen,et al. n-Gram Statistics for Natural Language Understanding and Text Processing , 1979, IEEE Transactions on Pattern Analysis and Machine Intelligence.