Packet- vs. session-based modeling for intrusion detection systems
暂无分享,去创建一个
[1] Stephen Northcutt,et al. Intrusion Signatures and Analysis , 2001 .
[2] Lee M. Rossey,et al. Extending the DARPA off-line intrusion detection evaluations , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[3] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[4] Philip K. Chan,et al. Learning Rules and Clusters for Anomaly Detection in Network Traffic , 2005 .
[5] Paul Douglas,et al. Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[6] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[7] Alberto Leon-Garcia,et al. Communication Networks: Fundamental Concepts and Key Architectures , 1999 .
[8] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[9] William H. Allen,et al. Analysis, detection, and modeling of attacks in computer communication networks , 2003 .
[10] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[11] J. P. Ed,et al. Transmission control protocol- darpa internet program protocol specification , 1981 .
[12] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).