Locality-based profile analysis for secondary intrusion detection
暂无分享,去创建一个
[1] John McHugh,et al. Locality: a new paradigm for thinking about normal behavior and outsider threat , 2003, NSPW '03.
[2] George C. Polyzos,et al. A Parameterizable Methodology for Internet Traffic Flow Profiling , 1995, IEEE J. Sel. Areas Commun..
[3] Chengqi Zhang,et al. MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agent , 2004 .
[4] Christopher Krügel,et al. Decentralized Event Correlation for Intrusion Detection , 2001, ICISC.
[5] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[6] Wei Jiang,et al. The Mahalanobis–Taguchi Strategy , 2003, Technometrics.
[7] Christopher Kruegel,et al. Connection-History Based Anomaly Detection , 2002 .
[8] Christopher Krügel,et al. Distributed Pattern Detection for Intrusion Detection , 2002, NDSS.
[9] Robert Morris,et al. Designing a framework for active worm detection on global networks , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..