Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems
暂无分享,去创建一个
Yuan-Cheng Lai | Ying-Dar Lin | Frank C. Lin | Po-Ching Lin | I-Wei Chen | Tsung-Huan Cheng | Chi-Chung Luo | Ying Lin | Po-Ching Lin | Y. Lai | I-Wei Chen | F. C. Lin | Chi-Chung Luo | Tsung-Huan Cheng
[1] Weider D. Yu,et al. Software Vulnerability Analysis for Web Services Software Systems , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[2] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[3] Donghui Guo,et al. Agent-based Intrusion Detection For Network-based Application , 2009, Int. J. Netw. Secur..
[4] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[5] Abdulmotaleb El-Saddik,et al. Detecting and Preventing IP-spoofed Distributed DoS Attacks , 2008, Int. J. Netw. Secur..
[6] Tarun Bhaskar,et al. A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability , 2008, Int. J. Netw. Secur..
[7] Thiagarajan Hamsapriya,et al. Statistical Segregation Method to Minimize the False Detections During DDoS Attacks , 2011, Int. J. Netw. Secur..
[8] Michael S. Greenberg,et al. Network Forensics Analysis , 2002, IEEE Internet Comput..
[9] Li Wang,et al. Automatic multi-step attack pattern discovering , 2008 .
[10] Ali A. Ghorbani,et al. A Rule-based Temporal Alert Correlation System , 2007, Int. J. Netw. Secur..
[11] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[12] A. Nur Zincir-Heywood,et al. Using Intrusion Detection Systems with a Firewall : Evaluation on DARPA 99 Dataset , .
[13] Yijun He,et al. Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks , 2009, Int. J. Netw. Secur..
[14] David Watson,et al. The Blaster worm: then and now , 2005, IEEE Security & Privacy Magazine.
[15] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[16] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[17] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.