Malicious- and Accidental-Fault Tolerance for Internet Applications Design of an Intrusion-Tolerant Intrusion Detection System
暂无分享,去创建一个
[1] Sean Rooney,et al. Remote Code Browsing, a Network Based Computation Utility , 2002, DSOM.
[2] Klaus Julisch,et al. Using root cause analysis to handle intrusion detection alarms , 2003 .
[3] Hervé Debar,et al. Building an Intrusion-Detection System to Detect Suspicious Process Behavior , 1999, Recent Advances in Intrusion Detection.
[4] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[5] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[6] Lisa Talbot,et al. Data Mining for Improving Intrusion Detection , 2000 .
[7] Salvatore J. Stolfo,et al. A coding approach to event correlation , 1995, Integrated Network Management.
[8] Klaus Julisch,et al. Mining alarm clusters to improve alarm handling efficiency , 2001, Seventeenth Annual Computer Security Applications Conference.
[9] Dimitrios Gunopulos,et al. Automatic subspace clustering of high dimensional data for data mining applications , 1998, SIGMOD '98.
[10] Jiawei Han,et al. Knowledge Discovery in Databases: An Attribute-Oriented Approach , 1992, VLDB.
[11] Hermann Kopetz,et al. Fault tolerance, principles and practice , 1990 .
[12] Hermann Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992 .
[13] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[14] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[15] Jesse C. Rabek,et al. LARIAT: Lincoln adaptable real-time information assurance testbed , 2002, Proceedings, IEEE Aerospace Conference.
[16] John Mhugh. The 1998 Lincoln Laboratory IDS evaluation : A critique , 2000 .
[17] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[18] Jon M. Kleinberg,et al. Clustering categorical data: an approach based on dynamical systems , 2000, The VLDB Journal.
[19] Sushil Jajodia,et al. Abstraction-based intrusion detection in distributed environments , 2001, TSEC.
[20] Ron Shamir,et al. Clustering Gene Expression Patterns , 1999, J. Comput. Biol..
[21] R. Sekar,et al. A high-performance network intrusion detection system , 1999, CCS '99.
[22] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[23] M. Paradies,et al. Root cause analysis at Savannah River plant (nuclear power station) , 1988, Conference Record for 1988 IEEE Fourth Conference on Human Factors and Power Plants,.
[24] Miguel Correia,et al. First Specification of APIs and Protocols for the MAFTIA Middleware , 2001 .
[25] Marc Dacier,et al. A Lightweight Tool for Detecting Web Server Attacks , 2000, NDSS.
[26] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[27] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[28] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[29] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[30] Andrew Stewart. Distributed Metastasis : A Computer Network Penetration Methodology , 1999 .
[31] Yiming Yang,et al. A Comparative Study on Feature Selection in Text Categorization , 1997, ICML.
[32] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[33] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[34] Huan Liu,et al. A Probabilistic Approach to Feature Selection - A Filter Solution , 1996, ICML.
[35] Steven M. Bellovin,et al. Packets found on an internet , 1993, CCRV.
[36] Lee M. Rossey,et al. Extending the DARPA off-line intrusion detection evaluations , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[37] Frédéric Cuppens,et al. Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.
[38] Daphne Koller,et al. Toward Optimal Feature Selection , 1996, ICML.
[39] Chris Clifton,et al. Developing custom intrusion detection filters using data mining , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[40] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[41] Victor Shoup,et al. Secure and Efficient Asynchronous Broadcast Protocols , 2001, CRYPTO.
[42] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[43] Eugene H. Spafford,et al. Using internal sensors for computer intrusion detection , 2001 .
[44] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[45] Salvatore J. Stolfo,et al. Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection , 1998, KDD.
[46] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[47] Jiawei Han,et al. Data-Driven Discovery of Quantitative Rules in Relational Databases , 1993, IEEE Trans. Knowl. Data Eng..
[48] Marc Dacier,et al. Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.
[49] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[50] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[51] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[52] Johannes Gehrke,et al. CACTUS—clustering categorical data using summaries , 1999, KDD '99.
[53] Aris Floratos,et al. Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm [published erratum appears in Bioinformatics 1998;14(2): 229] , 1998, Bioinform..
[54] Marc Dacier,et al. A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.
[55] Joseph L. Hellerstein,et al. Mining Event Data for Actionable Patterns , 2000, Int. CMG Conference.
[56] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[57] Sudipto Guha,et al. ROCK: A Robust Clustering Algorithm for Categorical Attributes , 2000, Inf. Syst..