Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems
暂无分享,去创建一个
Luiz Eduardo Soares de Oliveira | Altair Olivo Santin | Eduardo Viegas | Ricardo P. Jasinski | Volnei A. Pedroni | Andre Luiz Pereira de Franca | Luiz Oliveira | V. Pedroni | R. Jasinski | A. Santin | E. Viegas
[1] Richard P. Lippmann,et al. An Overview of Issues in Testing Intrusion Detection Systems , 2003 .
[2] Rajagopalan Vijayasarathy,et al. A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[3] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[4] Jiankun Hu,et al. A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[5] Jugal K. Kalita,et al. MIFS-ND: A mutual information-based feature selection method , 2014, Expert Syst. Appl..
[6] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.
[7] Quang Anh Tran,et al. Evolving Block-Based Neural Network and Field Programmable Gate Arrays for Host-Based Intrusion Detection System , 2012, 2012 Fourth International Conference on Knowledge and Systems Engineering.
[8] Alok N. Choudhary,et al. An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System , 2008, 2008 Design, Automation and Test in Europe.
[9] Abhishek Sharma,et al. Efficient implementation of packet pre-filtering for scalable analysis of IP traffic on high-speed lines , 2012, SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks.
[10] Daniel Bedard,et al. PowerMon: Fine-grained and integrated power monitoring for commodity computer systems , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).
[11] Altair Olivo Santin,et al. Moving Network Protection from Software to Hardware: An Energy Efficiency Analysis , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.
[12] Christos-Savvas Bouganis,et al. Novel Cascade FPGA Accelerator for Support Vector Machines Classification , 2012, IEEE Transactions on Neural Networks and Learning Systems.
[13] Markos Papadonikolakis,et al. A novel FPGA-based SVM classifier , 2010, 2010 International Conference on Field-Programmable Technology.
[14] Maria Dolores Gil Montoya,et al. A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems , 2013, Soft Comput..
[15] Geoffrey Brown,et al. Reconfigurable Architecture for Network Flow Analysis , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[16] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[17] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[18] Vallipuram Muthukkumarasamy,et al. Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.
[19] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[20] Deian Stefan,et al. FPGA-based SoC for real-time network intrusion detection using counting bloom filters , 2009, IEEE Southeastcon 2009.
[21] Altair Olivo Santin,et al. The energy cost of network security: A hardware vs. software comparison , 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS).
[22] Thanvarat Komviriyavut,et al. Network intrusion detection and classification with Decision Tree and rule based approaches , 2009, 2009 9th International Symposium on Communications and Information Technology.
[23] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[24] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[25] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[26] Salvatore Pontarelli,et al. Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System , 2013, IEEE Transactions on Computers.
[27] Jugal K. Kalita,et al. Packet and Flow Based Network Intrusion Dataset , 2012, IC3.
[28] Fabio Roli,et al. Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues , 2013, Inf. Sci..
[29] M. Vanitha,et al. Data mining for network intrusion detection system in real time , 2009 .
[30] Jun Yan,et al. Accurate and Low-Overhead Process-Level Energy Estimation for Modern Hard Disk Drives , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[31] Sotirios G. Ziavras,et al. Efficient hardware support for pattern matching in network intrusion detection , 2010, Comput. Secur..
[32] Dong Seong Kim,et al. Genetic algorithm to improve SVM based network intrusion detection system , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[33] Jun-Yong Lee,et al. A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention , 2007, J. Syst. Archit..
[34] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[35] Ming-Yang Su,et al. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach , 2009, Comput. Secur..
[36] James H. Laros,et al. PowerInsight - A commodity power measurement capability , 2013, 2013 International Green Computing Conference Proceedings.
[37] George Varghese,et al. Building a better NetFlow , 2004, SIGCOMM 2004.
[38] Alok N. Choudhary,et al. An FPGA-Based Network Intrusion Detection Architecture , 2008, IEEE Transactions on Information Forensics and Security.
[39] KatashitaToshihiro,et al. FPGA-Based Intrusion Detection System for 10 Gigabit Ethernet , 2007 .
[40] Zouheir Trabelsi,et al. An Anomaly Intrusion Detection System Employing Associative String Processor , 2010, 2010 Ninth International Conference on Networks.
[41] DebK.,et al. A fast and elitist multiobjective genetic algorithm , 2002 .
[42] Andrew J. Clark,et al. Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..
[43] Ron Kohavi,et al. Irrelevant Features and the Subset Selection Problem , 1994, ICML.
[44] Shirley Moore,et al. Measuring Energy and Power with PAPI , 2012, 2012 41st International Conference on Parallel Processing Workshops.
[45] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[46] Taner Tuncer,et al. FPGA based programmable embedded intrusion detection system , 2010, SIN.
[47] Luiz Eduardo Soares de Oliveira,et al. A Methodology for Feature Selection Using Multiobjective Genetic Algorithms for Handwritten Digit String Recognition , 2003, Int. J. Pattern Recognit. Artif. Intell..
[48] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[49] Haoyu Song,et al. Efficient packet classification for network intrusion detection using FPGA , 2005, FPGA '05.