Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
暂无分享,去创建一个
[1] P. Laskov,et al. Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines , 2004, Prax. Inf.verarb. Kommun..
[2] Jiong Yang,et al. STING: A Statistical Information Grid Approach to Spatial Data Mining , 1997, VLDB.
[3] Alok N. Choudhary,et al. A scalable parallel subspace clustering algorithm for massive data sets , 2000, Proceedings 2000 International Conference on Parallel Processing.
[4] Hans-Peter Kriegel,et al. OPTICS: ordering points to identify the clustering structure , 1999, SIGMOD '99.
[5] Klaus-Robert Müller,et al. Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines , 2004 .
[6] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[7] Ulrich Güntzer,et al. Algorithms for association rule mining — a general survey and comparison , 2000, SKDD.
[8] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[9] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[10] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[11] Aidong Zhang,et al. WaveCluster: A Multi-Resolution Clustering Approach for Very Large Spatial Databases , 1998, VLDB.
[12] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[13] Diane J. Cook,et al. Graph-based anomaly detection , 2003, KDD '03.
[14] D. Eskin. Anomaly Dete tion over Noisy Datausing Learned Probability , 2000 .
[15] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[16] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[17] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[18] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[19] T. Lane,et al. Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .
[20] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[21] Dipankar Dasgupta,et al. Neuro-Immune and Self-Organizing Map Approaches to Anomaly Detection: A Comparison , 2002 .
[22] Christopher Leckie,et al. An efficient filter for denial-of-service bandwidth attacks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[23] Dimitrios Gunopulos,et al. Automatic subspace clustering of high dimensional data for data mining applications , 1998, SIGMOD '98.
[24] Christopher Leckie,et al. Adaptive Clustering for Network Intrusion Detection , 2004, PAKDD.
[25] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD '00.
[26] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[27] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .