-
2
-
-
0142253852
-
ADAM: A testbed for exploring the use of data mining in intrusion detection
-
D. Barbará, J. Couto, S. Jajodia, and N. Wu. ADAM: a testbed for exploring the use of data mining in intrusion detection. SIGMOD Record, 30(4):15-24, 2001.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 15-24
-
-
Barbará, D.1
Couto, J.2
Jajodia, S.3
Wu, N.4
-
5
-
-
33750939148
-
The UCI KDD archive of large data sets for data mining research and experimentation
-
S. D. Bay, D. Kibler, M. Pazzani, and P. Smyth. The UCI KDD archive of large data sets for data mining research and experimentation. SIGKDD Exploration: Newsletter of SIGKDD and Data Mining, 2(2):81-85, 2000.
-
(2000)
SIGKDD Exploration: Newsletter of SIGKDD and Data Mining
, vol.2
, Issue.2
, pp. 81-85
-
-
Bay, S.D.1
Kibler, D.2
Pazzani, M.3
Smyth, P.4
-
8
-
-
6344255762
-
Next generation intrusion detection: Autonomous reinforcement learning of network attacks
-
J. D. Cannady. Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks. In NISSC '00: Proc. 23rd National Information Systems Security Conference, 2000. URL http://csrc.nist.gov/nissc/ 2000/proceedings/papers/033.pdf.
-
(2000)
NISSC '00: Proc. 23rd National Information Systems Security Conference
-
-
Cannady, J.D.1
-
9
-
-
33845391802
-
Vigilante: End-to-end containment of Internet worms
-
ACM Press
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of Internet worms. In SOSP '05: Proc. 20th ACM Symposium on Operating Systems Principles, pages 133-147. ACM Press, 2005.
-
(2005)
SOSP '05: Proc. 20th ACM Symposium on Operating Systems Principles
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
10
-
-
0028911698
-
Gauging similarity with n-grams: Language-independent categorization of text
-
M. Damashek. Gauging similarity with n-grams: Language-independent categorization of text. Science, 267(5199):843-848, 1995.
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
12
-
-
18844425792
-
Network based anomaly intrusion detection using Self Organizing Maps (SOMs)
-
M. O. Depren, M. Topallar, E. Anarim, and K. Ciliz. Network Based Anomaly Intrusion Detection using Self Organizing Maps (SOMs). In SIU '04: Proc. 12th IEEE National Conference on Signal Processing and Applications, pages 76-79, 2004.
-
(2004)
SIU '04: Proc. 12th IEEE National Conference on Signal Processing and Applications
, pp. 76-79
-
-
Depren, M.O.1
Topallar, M.2
Anarim, E.3
Ciliz, K.4
-
13
-
-
1542292055
-
What is the nearest neighbor in high dimensional spaces?
-
A. E. Abbadi, M. L. Brodie, S. Chakravarthy, U. Dayal, N. Kamel, G. Schlageter, and K. Whang, editors. Morgan Kaufmann
-
A. Hinneburg, C. C. Aggarwal, and D. A. Keim. What Is the Nearest Neighbor in High Dimensional Spaces? In A. E. Abbadi, M. L. Brodie, S. Chakravarthy, U. Dayal, N. Kamel, G. Schlageter, and K. Whang, editors, VLDB '00: Proc. 26th International Conference on Very Large Data Bases, pages 506-515. Morgan Kaufmann, 2000.
-
(2000)
VLDB '00: Proc. 26th International Conference on Very Large Data Bases
, pp. 506-515
-
-
Hinneburg, A.1
Aggarwal, C.C.2
Keim, D.A.3
-
15
-
-
33750935229
-
-
SANS Institute - Internet Storm Center web site. URL http://isc.sans.org/ index.php?on=toptrends.
-
-
-
-
17
-
-
33745773307
-
-
Research Report RZ 3398, IBM Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, February
-
K. Julisch. Data Mining for Intrusion Detection: A Critical Review. Research Report RZ 3398, IBM Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, February 2002.
-
(2002)
Data Mining for Intrusion Detection: A Critical Review
-
-
Julisch, K.1
-
18
-
-
0004029914
-
-
Self-Organizing Maps. Springer. (Second Extended Edition)
-
T. Kohonen. Self-Organizing Maps, volume 30 of Springer Series in Information Sciences. Springer. 1995. (Second Extended Edition 1997).
-
(1995)
Springer Series in Information Sciences
, vol.30
-
-
Kohonen, T.1
-
21
-
-
85084163349
-
Data mining approaches for intrusion detection
-
USENIX Association
-
W. Lee and S. Stolfo. Data mining approaches for intrusion detection. In Proc. 7th USENIX Security Symposium, pages 79-94. USENIX Association, 1998.
-
(1998)
Proc. 7th USENIX Security Symposium
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.2
-
23
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks: The International Journal of Computer and Telecommunications Networking, 34(4):579-595, 2000.
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
25
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
-
M. V. Mahoney and P. K. Chan. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection, volume 2820 of LNCS, pages 220-237. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2820
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
26
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh. Testing Intrusion Detection Systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4):262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 262-294
-
-
Mchugh, J.1
-
28
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
-
M. Ramadas, S. Ostermann, and B. C. Tjaden. Detecting Anomalous Network Traffic with Self-Organizing Maps. In G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection, volume 2820 of LNCS, pages 36-54. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2820
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.C.3
-
30
-
-
33750958987
-
-
Snort Network Intrusion Detection System web site. URL http://www.snort.org.
-
-
-
-
31
-
-
33745641552
-
Anomalous payload-based worm detection and signature generation
-
A. Valdes and D. Zamboni, editors, RAID '05: Proc. 8th International Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
-
K. W. G. C. S. J. Stolfo. Anomalous Payload-based Worm Detection and Signature Generation. In A. Valdes and D. Zamboni, editors, RAID '05: Proc. 8th International Symposium on Recent Advances in Intrusion Detection, volume 3858 of LNCS, pages 227-246. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.3858
, pp. 227-246
-
-
Stolfo, K.W.G.C.S.J.1
-
32
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
E. Jonsson, A. Valdes, and M. Almgren, editors, RAID '04: Proc. 7th Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
-
K. Wang and S. J. Stolfo. Anomalous Payload-Based Network Intrusion Detection. In E. Jonsson, A. Valdes, and M. Almgren, editors, RAID '04: Proc. 7th Symposium on Recent Advances in Intrusion Detection, volume 3224 of LNCS, pages 203-222. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
33
-
-
0034592923
-
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms
-
ACM Press
-
K. Yamanishi, J. Takeuchi, G. J. Williams, and P. Milne. On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. In KDD '00: Proc. 6th ACM SIGKDD international conference on Knowledge Discovery and Data Mining, pages 320-324. ACM Press, 2000.
-
(2000)
KDD '00: Proc. 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 320-324
-
-
Yamanishi, K.1
Takeuchi, J.2
Williams, G.J.3
Milne, P.4
-
34
-
-
33745165284
-
Analyzing TCP traffic patterns using self organizing maps
-
F. Roli and S. Vitulano, editors, ICIAP '05: Proc. 13th International Conference on Image Analysis and Processing. Springer-Verlag
-
S. Zanero. Analyzing TCP Traffic Patterns using Self Organizing Maps. In F. Roli and S. Vitulano, editors, ICIAP '05: Proc. 13th International Conference on Image Analysis and Processing, volume 3617 of LNCS, pages 83-90. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3617
, pp. 83-90
-
-
Zanero, S.1
|