-
1
-
-
0037105910
-
Intrusion detection techniques and approaches
-
Sept.
-
T. Verwoerd and R. Hunt, "Intrusion detection techniques and approaches," Comput. Commun., vol.25, no.15, pp.1356-1365, Sept. 2002.
-
(2002)
Comput. Commun.
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
2
-
-
4344659702
-
Anomaly detection methods in wired networks: A survey and taxonomy
-
Oct.
-
J.M. Estvez-Tapiador, P. Garcia-Teodoro, and J.E. Diaz-Verdejo, "Anomaly detection methods in wired networks: A survey and taxonomy," Comput. Commun., vol.27, no. 16, pp. 1569-1584, Oct. 2004.
-
(2004)
Comput. Commun.
, vol.27
, Issue.16
, pp. 1569-1584
-
-
Estvez-Tapiador, J.M.1
Garcia-Teodoro, P.2
Diaz-Verdejo, J.E.3
-
4
-
-
85027158471
-
-
http://www.snort.org,2004
-
(2004)
-
-
-
5
-
-
0023294428
-
An intrusion-detection model
-
Feb.
-
D.E. Denning. "An intrusion-detection model," IEEE Trans. Softw. Eng., vol.13, no.2, pp.222-232, Feb. 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
6
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
Jan.
-
N. Ye, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol.51, no.13, pp.810-820, Jan. 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.13
, pp. 810-820
-
-
Ye, N.1
-
7
-
-
0036122767
-
Robustness of chi-square and Canberra techniques in detecting intrusions into information systems
-
Jan.
-
S.M. Emran and N. Ye, "Robustness of chi-square and Canberra techniques in detecting intrusions into information systems," Qual. Reliab. Eng. Int., vol.18, no.1, pp.19-28, Jan. 2002.
-
(2002)
Qual. Reliab. Eng. Int.
, vol.18
, Issue.1
, pp. 19-28
-
-
Emran, S.M.1
Ye, N.2
-
8
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled-data
-
Kluwer
-
E. Eskin, A. Arnold, and M. Prerau, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled-data," in Applications of Data Mining in Computer Security, Kluwer, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
-
9
-
-
4344644051
-
A clustering-based anomaly intrusion detection for a host computer
-
Aug.
-
S.H. Oh and W.S. Lee, "A clustering-based anomaly intrusion detection for a host computer," IEICE Trans. Inf. & Syst., vol.E87-D, no.8, pp.2086-2094, Aug. 2004.
-
(2004)
IEICE Trans. Inf. & Syst.
, vol.E87-D
, Issue.8
, pp. 2086-2094
-
-
Oh, S.H.1
Lee, W.S.2
-
10
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, June
-
L. Portnoy, E. Eskin, and S.J. Stolfo, "Intrusion detection with unlabeled data using clustering," Proc. ACM CSS Workshop on Data Mining Applied to Security, pp. 123-130, Philadelphia, PA, June 2001.
-
(2001)
Proc. ACM CSS Workshop on Data Mining Applied to Security
, pp. 123-130
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.J.3
-
11
-
-
0009900351
-
Anomaly detection over noisy data using learned probability distributions
-
San Francisco, CA, July
-
E. Eskin, "Anomaly detection over noisy data using learned probability distributions," Proc. 17th Int. Conf. Machine Learning, pp.255-262, San Francisco, CA, July 2000.
-
(2000)
Proc. 17th Int. Conf. Machine Learning
, pp. 255-262
-
-
Eskin, E.1
-
12
-
-
0002948319
-
Algorithms for mining distance-based outliers in large datasets
-
New York, USA, Sept.
-
E. Knorr and R. Ng, "Algorithms for mining distance-based outliers in large datasets," Proc. VLDB Conference, pp.392-403, New York, USA, Sept. 1998.
-
(1998)
Proc. VLDB Conference
, pp. 392-403
-
-
Knorr, E.1
Ng, R.2
-
13
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Orlando, FL, May
-
A. Lazarevic, L. Ertoz, A. Ozgur, and J. Srivastava, "A comparative study of anomaly detection schemes in network intrusion detection," Proc. SIAM Conf. Data Mining, pp.108-120, Orlando, FL, May 2003.
-
(2003)
Proc. SIAM Conf. Data Mining
, pp. 108-120
-
-
Lazarevic, A.1
Ertoz, L.2
Ozgur, A.3
Srivastava, J.4
-
14
-
-
0141757198
-
Intrusion detection using neural networks and support vector machines
-
Physica/Springer, Heidelberg, Dec.
-
S. Mukkamala, G. Janowski, and AH. Sung, "Intrusion detection using neural networks and support vector machines," Proc. Hybrid Information Systems Advances in Soft Computing, pp. 121-138, Physica/Springer, Heidelberg, Dec. 2001.
-
(2001)
Proc. Hybrid Information Systems Advances in Soft Computing
, pp. 121-138
-
-
Mukkamala, S.1
Janowski, G.2
Sung, A.H.3
-
15
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
Orlando, USA, Jan.
-
A.H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," Proc. 2003 Symposium on Applications and the Internet, pp.209-217, Orlando, USA, Jan. 2003.
-
(2003)
Proc. 2003 Symposium on Applications and the Internet
, pp. 209-217
-
-
Sung, A.H.1
Mukkamala, S.2
-
16
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
June
-
Y. Qiao, X.W. Xin, Y. Bin, and S. Ge, "Anomaly intrusion detection method based on HMM," Electron. Lett., vol.38, no. 13, pp.663-664, June 2002.
-
(2002)
Electron. Lett.
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
17
-
-
32244444272
-
An adaptive intrusion detection system using neural network
-
UNESP, Brazil
-
J.M. Bonifaco and E.S. Moreira, "An adaptive intrusion detection system using neural network," Research Report, UNESP, Brazil, 1997.
-
(1997)
Research Report
-
-
Bonifaco, J.M.1
Moreira, E.S.2
-
18
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, USA, May
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," Proc. 1999 IEEE Symposium on Security and Privacy, pp. 133-145, Oakland, USA, May 1999.
-
(1999)
Proc. 1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
19
-
-
2942666805
-
Intrusion detection using support vector machines
-
San Diego, USA, April
-
S. Mukkamala, G.I. Janoski, and A.H. Sung, "Intrusion detection using support vector machines," Proc. High Performance Computing Symposium - HPC 2002, pp. 178-183, San Diego, USA, April 2002.
-
(2002)
Proc. High Performance Computing Symposium - HPC 2002
, pp. 178-183
-
-
Mukkamala, S.1
Janoski, G.I.2
Sung, A.H.3
-
20
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
Oakland, USA, May
-
L. Wenke, S.J. Stolfo, and K.W. Mok, "A data mining framework for building intrusion detection models," Proc. 1999 IEEE Symposium on Security and Privacy, pp.296-304, Oakland, USA, May 1999.
-
(1999)
Proc. 1999 IEEE Symposium on Security and Privacy
, pp. 296-304
-
-
Wenke, L.1
Stolfo, S.J.2
Mok, K.W.3
-
21
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
Oct.
-
Y. Liao and V. Rao Vemuri, "Use of k-nearest neighbor classifier for intrusion detection," Comput. Secur., vol.21, no.5, pp.439-448, Oct. 2002.
-
(2002)
Comput. Secur.
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Rao Vemuri, V.2
-
22
-
-
27244448490
-
Network intrusion detection by a multi-stage classification system
-
Cagliari, Italy, June
-
L.P. Cordella, A. Limongiello, and C. Sansone, "Network intrusion detection by a multi-stage classification system," Proc. Multiple Classifier Systems: 5th International Workshop, MCS 2004, pp.324-333, Cagliari, Italy, June 2004.
-
(2004)
Proc. Multiple Classifier Systems: 5th International Workshop, MCS 2004
, pp. 324-333
-
-
Cordella, L.P.1
Limongiello, A.2
Sansone, C.3
-
23
-
-
4544282659
-
Detecting anomalous network traffic with self-organizing maps
-
Pittsburgh, PA, USA, Sept.
-
M. Ramadas, S. Ostermann, and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps," Proc. Recent Advances in Intrusion Detection: 6th International Symposium, RAID 2003, pp.34-56, Pittsburgh, PA, USA, Sept. 2003.
-
(2003)
Proc. Recent Advances in Intrusion Detection: 6th International Symposium, RAID 2003
, pp. 34-56
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
24
-
-
4544251643
-
Network intrusion detection using an improved competitive learning neural network
-
Fredericton, N.B., Canada, May
-
J.Z. Lei and A. Ghorbani, "Network intrusion detection using an improved competitive learning neural network," Proc. Second Annual Conference on Communication Networks and Services Research (CNSR'04), pp. 190-197, Fredericton, N.B., Canada, May 2004.
-
(2004)
Proc. Second Annual Conference on Communication Networks and Services Research (CNSR'04)
, pp. 190-197
-
-
Lei, J.Z.1
Ghorbani, A.2
-
25
-
-
0018918171
-
An algorithm for vector quantizer design
-
Jan.
-
Y. Linde, A. Buzo, and R.M. Gray, "An algorithm for vector quantizer design," IEEE Trans. Commun., vol.28, no.1, pp.84-95, Jan. 1980.
-
(1980)
IEEE Trans. Commun.
, vol.28
, Issue.1
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gray, R.M.3
-
26
-
-
0037522007
-
Indexing multimedia data in high-dimensional and weighted feature spaces
-
Brisbane, Australia, May
-
K. Goh and E. Chang, "Indexing multimedia data in high-dimensional and weighted feature spaces," Proc. 6th Visual Database Conference, pp. 127-140, Brisbane, Australia, May 2002.
-
(2002)
Proc. 6th Visual Database Conference
, pp. 127-140
-
-
Goh, K.1
Chang, E.2
-
27
-
-
0034996152
-
Approximate nearest neighbor searching in multimedia databases
-
Heidelberg, Germany, April
-
H. Ferhatosmanoglu, E. Tuncel, D. Agrawal, and A. El Abbadi, "Approximate nearest neighbor searching in multimedia databases," Proc. 17th IEEE Int. Conf. on Data Engineering, pp.503-511, Heidelberg, Germany, April 2001.
-
(2001)
Proc. 17th IEEE Int. Conf. on Data Engineering
, pp. 503-511
-
-
Ferhatosmanoglu, H.1
Tuncel, E.2
Agrawal, D.3
El Abbadi, A.4
-
28
-
-
0024984441
-
Adaptive, real-time anomaly detection using inductively generated sequential patterns
-
Oakland, USA, May
-
H. Teng, K. Chen, and S. Lu, "Adaptive, real-time anomaly detection using inductively generated sequential patterns," Proc. IEEE Symposium on Research in Security and Privacy, pp.278-284, Oakland, USA, May 1990.
-
(1990)
Proc. IEEE Symposium on Research in Security and Privacy
, pp. 278-284
-
-
Teng, H.1
Chen, K.2
Lu, S.3
-
29
-
-
0028607656
-
A new competitive learning approach based on an equidistoition principle for designing optimal vector quantizers
-
Sept.
-
N. Ueda and R. Nakano, "A new competitive learning approach based on an equidistoition principle for designing optimal vector quantizers," IEEE Trans. Neural Netw., vol.7, no.8, pp. 1211-1227, Sept. 1994.
-
(1994)
IEEE Trans. Neural Netw.
, vol.7
, Issue.8
, pp. 1211-1227
-
-
Ueda, N.1
Nakano, R.2
-
31
-
-
32244444468
-
A fast codebook search algorithm for vector quantization
-
Feb.
-
Z. Lu, J. Pan, and S. Sun, "A fast codebook search algorithm for vector quantization," Acta Electronica Sinica, vol.28, no.2, pp. 133-135, Feb. 2000.
-
(2000)
Acta Electronica Sinica
, vol.28
, Issue.2
, pp. 133-135
-
-
Lu, Z.1
Pan, J.2
Sun, S.3
-
32
-
-
85027099846
-
-
http://libnids.sourceforge.net/
-
-
-
-
33
-
-
85027128451
-
-
http://www.ll.mit.edu/IST/ideval/index.html
-
-
-
-
34
-
-
0034301517
-
The 1999 DARPA off-Line intrusion detection evaluation
-
Oct.
-
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das, "The 1999 DARPA off-Line intrusion detection evaluation," Comput. Netw., vol.34, no.4, pp.579-595, Oct. 2000.
-
(2000)
Comput. Netw.
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
35
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
Feb.
-
S. Mukkamala, A.H. Sung, and A. Abraham, "Intrusion detection using an ensemble of intelligent paradigms," J. Netw. Comput. Appl., vol.28, no.2, pp.167-182, Feb. 2005.
-
(2005)
J. Netw. Comput. Appl.
, vol.28
, Issue.2
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
|