Detection and Isolation of Anomalies for DETER Emulation of Abilene
暂无分享,去创建一个
S. Shankar Sastry | Saurabh Amin | Blaine Nelson | Faculty Mentor | Howells Ihekweme | Suzanna Shmeelk
[1] Dongho Kim,et al. Experience with DETER: a testbed for security research , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[4] Calvin Ko,et al. SEER: A Security Experimentation EnviRonment for DETER , 2007, DETER.
[5] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[6] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[7] Farouk Kamoun,et al. Traffic Anomaly Detection and Characterization in the Tunisian National University Network , 2006, Networking.
[8] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Ling Huang,et al. D-trigger: a general framework for efficient online detection , 2007 .