Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning
暂无分享,去创建一个
[1] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[2] Nancy Forbes,et al. Computer Immune Systems , 2005 .
[3] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[4] Syed Ali Khayam,et al. A Comparative Evaluation of Anomaly Detectors under Portscan Attacks , 2008, RAID.
[5] Jason Lee,et al. A first look at modern enterprise traffic , 2005, IMC '05.
[6] Geoff Holmes,et al. New ensemble methods for evolving data streams , 2009, KDD.
[7] Bhavani M. Thuraisingham,et al. Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints , 2011, IEEE Transactions on Knowledge and Data Engineering.
[8] Debin Gao,et al. Behavioral Distance for Intrusion Detection , 2005, RAID.
[9] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[10] Neri Merhav,et al. On the estimation of the order of a Markov chain and universal data compression , 1989, IEEE Trans. Inf. Theory.
[11] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[12] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[13] Marcus A. Maloof,et al. Using additive expert ensembles to cope with concept drift , 2005, ICML.
[14] Matthew M. Williamson,et al. Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.
[15] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[16] Boris Skoric,et al. Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems , 2006, ESORICS.
[17] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[18] Stefano Zanero,et al. Detecting Intrusions through System Call Sequence and Argument Analysis , 2010, IEEE Transactions on Dependable and Secure Computing.
[19] John S. Baras,et al. A framework for the evaluation of intrusion detection systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[20] Hisashi Kashima,et al. Eigenspace-based anomaly detection in computer systems , 2004, KDD.
[21] Philip S. Yu,et al. Stop Chasing Trends: Discovering High Order Models in Evolving Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[22] Young U. Ryu,et al. Evaluation of Intrusion Detection Systems Under a Resource Constraint , 2008, TSEC.
[23] Charu C. Aggarwal,et al. Addressing Concept-Evolution in Concept-Drifting Data Streams , 2010, 2010 IEEE International Conference on Data Mining.
[24] John Mark Agosta,et al. An adaptive anomaly detector for worm detection , 2007 .
[25] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.
[26] David Moore,et al. The Spread of the Witty Worm , 2004, IEEE Secur. Priv..
[27] H. V. Trees. Detection, Estimation, And Modulation Theory , 2001 .
[28] Dae-Ki Kang,et al. Learning classifiers for misuse and anomaly detection using a bag of system calls representation , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[29] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[30] Syed Ali Khayam,et al. On achieving good operating points on an ROC plane using stochastic anomaly score prediction , 2009, CCS.
[31] Jiawei Han,et al. On Appropriate Assumptions to Mine Data Streams: Analysis and Practice , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[32] Thomas Weigert,et al. An adaptive automatically tuning intrusion detection system , 2008, TAAS.
[33] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[34] Geoffrey A. Hollinger,et al. Tracking a moving target in cluttered environments with ranging radios , 2008, 2008 IEEE International Conference on Robotics and Automation.
[35] Salvatore J. Stolfo,et al. Adaptive Anomaly Detection via Self-calibration and Dynamic Updating , 2009, RAID.
[36] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[37] Philip S. Yu,et al. A framework for on-demand classification of evolving data streams , 2006, IEEE Transactions on Knowledge and Data Engineering.
[38] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[39] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[40] Fauzan Mirza,et al. On mitigating sampling-induced accuracy loss in traffic anomaly detection systems , 2010, CCRV.