Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
暂无分享,去创建一个
Boris Skoric | Guofei Gu | Wenke Lee | David Dagon | Prahlad Fogla | Wenke Lee | B. Škorić | D. Dagon | G. Gu | Prahlad Fogla
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[2] Guofei Gu,et al. Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.
[3] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[4] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[5] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[6] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[7] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[8] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[9] Vern Paxson,et al. Enhancing byte-level network intrusion detection signatures with context , 2003, CCS '03.
[10] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[11] V. Rao Vemuri,et al. Robust Support Vector Machines for Anomaly Detection in Computer Security , 2003, ICMLA.
[12] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[14] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[15] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[16] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[17] Stefan Axelsson. A Preliminary Attempt to Apply Detection and Estimation Theory to Intrusion Detection , 2007 .
[18] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[19] John S. Baras,et al. A framework for the evaluation of intrusion detection systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[20] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[21] Zied Elouedi,et al. Naive Bayes vs decision trees in intrusion detection systems , 2004, SAC '04.
[22] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[23] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[24] Cui Zhang,et al. Formal Reasoning About Intrusion Detection Systems , 2004, RAID.
[25] Paul Helman,et al. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..
[26] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[27] Giovanni Di Crescenzo,et al. Towards a Theory of Intrusion Detection , 2005, ESORICS.