Rule generalisation in intrusion detection systems using SNORT
暂无分享,去创建一个
[1] G. Lawton. Open Source Security: Opportunity or Oxymoron? , 2002, Computer.
[2] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[3] Fabio A. González,et al. An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[4] Stuart Staniford,et al. Viewing IDS alerts: lessons from SnortSnarf , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[5] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[6] Vince Fuller,et al. Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy , 1993, RFC.
[7] Mark Burgess,et al. Probabilistic anomaly detection in distributed computer networks , 2006, Sci. Comput. Program..
[8] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[9] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[10] Stephen Northcutt,et al. Network intrusion detection , 2003 .
[11] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[12] Peng Ning,et al. Hypothesizing and reasoning about attacks missed by intrusion detection systems , 2004, TSEC.