An Approach for Detecting Self-propagating Email Using Anomaly Detection
暂无分享,去创建一个
[1] Steve R. White,et al. Computers and epidemiology , 1993, IEEE Spectrum.
[2] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[3] John F. Morar,et al. An environment for controlled worm replication and analysis , 2000 .
[4] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[6] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[7] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[8] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[9] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[11] Klaus Julisch,et al. Mining alarm clusters to improve alarm handling efficiency , 2001, Seventeenth Annual Computer Security Applications Conference.
[12] Salvatore J. Stolfo,et al. Behavior Profiling of Email , 2003, ISI.
[13] Eleazar Eskin,et al. MET: an experimental system for Malicious Email Tracking , 2002, NSPW '02.
[14] M. Takikawa,et al. Cyber ecology: looking to ecology for insights into information assurance , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[15] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[16] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[17] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[18] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[19] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[20] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[21] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[22] Keith Marzullo,et al. A new model for availability in the face of self-propagating attacks , 1998, NSPW '98.
[23] Jim Alves-Foss,et al. NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach , 2001, NSPW '01.
[24] FaloutsosMichalis,et al. On power-law relationships of the Internet topology , 1999 .
[25] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[26] Stephanie Forrest,et al. Computer immunology , 1997, CACM.
[27] Matthew C. Elder,et al. On computer viral infection and the effect of immunization , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[28] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[29] R. Sekar,et al. A high-performance network intrusion detection system , 1999, CCS '99.
[30] Jeffrey O. Kephart,et al. Blueprint for a Computer Immune System , 1999 .
[31] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[32] Salvatore J. Stolfo,et al. USENIX Association Proceedings of the FREENIX Track : 2001 USENIX Annual , 2001 .
[33] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[34] Jim Alves-Foss,et al. NATE: Network Analysis ofAnomalousTrafficEvents, a low-cost approach , 2001 .
[35] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[36] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[37] TERRAN LANE,et al. Temporal sequence learning and data reduction for anomaly detection , 1999, TSEC.
[38] R. Sekar,et al. Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications , 1999, USENIX Security Symposium.