Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
暂无分享,去创建一个
Jun Ho Huh | S. Raj Rajagopalan | Maciej Korczynski | Ali Hamieh | Henrik Holm | Nina H. Fefferman | J. Huh | S. R. Rajagopalan | Maciej Korczyński | N. Fefferman | Ali Hamieh | Henrik Holm | Jun Ho Huh | S. Raj Rajagopalan
[1] M. Winston. The Biology of the Honey Bee , 1987 .
[2] Maciej Korczynski,et al. Developing Security Reputation Metrics for Hosting Providers , 2016, ArXiv.
[3] Jelena Mirkovic,et al. DefCOM: defensive cooperative overlay mesh , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[4] C. Leckie,et al. A peer-to-peer collaborative intrusion detection system , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[5] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[6] Jun Ho Huh,et al. DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).
[7] Dervis Karaboga,et al. A survey: algorithms simulating bee swarm intelligence , 2009, Artificial Intelligence Review.
[8] Glenn A. Fink,et al. Defense on the Move: Ant-Based Cyber Defense , 2014, IEEE Security & Privacy.
[9] Kensuke Fukuda,et al. MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.
[10] Andrzej Duda,et al. An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans , 2011, 2011 IEEE International Conference on Communications (ICC).
[11] M.E. Locasto,et al. Towards collaborative security and P2P intrusion detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[12] Jaideep Chandrashekar,et al. When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions , 2006, AAAI.
[13] Wojciech Mazurczyk,et al. Security--A Perpetual War: Lessons from Nature , 2015, IT Professional.