Internet Anomaly Detection Based on Statistical Covariance Matrix
暂无分享,去创建一个
[1] TERRAN LANE,et al. Temporal sequence learning and data reduction for anomaly detection , 1999, TSEC.
[2] Symeon Papavassiliou,et al. Network intrusion and fault detection: a statistical anomaly approach , 2002, IEEE Commun. Mag..
[3] Sung-Bae Cho,et al. Efficient anomaly detection by modeling privilege flows using hidden Markov model , 2003, Comput. Secur..
[4] John A. Gubner,et al. Theorems and fallacies in the theory of long-range-dependent Processes , 2005, IEEE Transactions on Information Theory.
[5] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[6] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[7] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[8] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[9] Connie M. Borror,et al. Robustness of the Markov-chain model for cyber-attack detection , 2004, IEEE Transactions on Reliability.
[10] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .
[11] Walter Willinger,et al. Experimental queueing analysis with long-range dependent packet traffic , 1996, TNET.
[12] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[13] Michalis Faloutsos,et al. Long-range dependence ten years of Internet traffic modeling , 2004, IEEE Internet Computing.
[14] Yan Gao,et al. Predicting the intrusion intentions by observing system call sequences , 2004, Comput. Secur..
[15] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[16] Matthew Roughan,et al. Real-time estimation of the parameters of long-range dependence , 2000, TNET.
[17] Armand M. Makowski. Long-range dependence does not necessarily imply non-exponential tails , 2002, IEEE Communications Letters.
[18] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.