An intelligent approach for Intrusion Detection based on data mining techniques
暂无分享,去创建一个
N. Hundewale | Mohd Junedul Haque | K. W. Magld | Mohd. Junedul Haque | Khalid W. Magld | Nisar Hundewale
[1] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[2] Henning Schulzrinne,et al. A Comparison of SIP and H.323 for Internet Telephony , 1998 .
[3] Venu Govindaraju,et al. Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.
[4] Luo Jiawei,et al. Using Alert Cluster to reduce IDS alerts , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[5] Hervé Debar,et al. Intrusion Detection Exchange Format Data Model , 2000 .
[6] Yang De-gang. A Research into Application of Data Mining Technology in Intrusion Detection , 2004 .
[7] H. S. Teng,et al. Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Peng Xiao-feng. Application of Data Mining in Network Intrusion Detection System , 2008 .
[9] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[10] Johann Thalhammer,et al. Security in VoIP-Telephony Systems , 2002 .
[11] Hartmut König,et al. The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis , 1996, Communications and Multimedia Security.
[12] T. Lane,et al. Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .
[13] Xu Jing. Design and Implementation of Data Mining-based IDS , 2002 .
[14] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[15] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[16] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[17] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[18] Paul Helman,et al. A statistically based system for prioritizing information exploration under uncertainty , 1997, IEEE Trans. Syst. Man Cybern. Part A.
[19] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[20] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..