Stochastic protocol modeling for anomaly based network intrusion detection
暂无分享,去创建一个
Juan E. Tapiador | Jesús E. Díaz-Verdejo | Pedro García-Teodoro | J. Tapiador | P. García-Teodoro | J. D. Verdejo
[1] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[2] John L. Cole,et al. Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany , 2003, IWIA.
[3] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[4] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[5] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[6] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[7] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Bogdan M. Wilamowski,et al. The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.
[9] Xu Ying,et al. A network state based intrusion detection model , 2001, Proceedings 2001 International Conference on Computer Networks and Mobile Computing.
[10] B. Ravichandran,et al. Statistical traffic modeling for network intrusion detection , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).
[11] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[12] Shawn Ostermann,et al. Detecting network intrusions via a statistical analysis of network packet characteristics , 2001, Proceedings of the 33rd Southeastern Symposium on System Theory (Cat. No.01EX460).
[13] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[14] J. Doob. Stochastic processes , 1953 .
[15] Somesh Jha,et al. Markov chains, classifiers, and intrusion detection , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[16] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[17] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.