-
1
-
-
84868130597
-
Collection and analysis of attack data based on honeypots deployed on the Internet
-
Milano, Italy
-
E. Alata, M. Dacier, Y. Deswarte, M. Kaaniche, K. Kortchinsky, V. Nicomette, V.H. Pham, and F. Pouget, Collection and Analysis of Attack data based on Honeypots deployed on the Internet, in Proc, of 1st Workshop on Quality of Protection (QoP), Milano, Italy, 2005.
-
(2005)
Proc, of 1st Workshop on Quality of Protection (QoP)
-
-
Alata, E.1
Dacier, M.2
Deswarte, Y.3
Kaaniche, M.4
Kortchinsky, K.5
Nicomette, V.6
Pham, V.H.7
Pouget, F.8
-
4
-
-
79851498286
-
Data mining for network intrusion detection
-
Baltimore, MD
-
P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P.-N. Tan, Data Mining for Network Intrusion Detection, in Proc. NSF Workshop on Next Generation Data Mining, Baltimore, MD, 2002.
-
(2002)
Proc. NSF Workshop on next Generation Data Mining
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.-N.6
-
5
-
-
4143149628
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, in Data Mining for Security Applications, Kluwer, 2002.
-
(2002)
Data Mining for Security Applications
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
6
-
-
84860051172
-
-
http://www.ethereal.com/
-
-
-
-
7
-
-
0012109964
-
-
The Honeynet Project, Addison-Wesley
-
The Honeynet Project, Know Your Enemy, Addison-Wesley, 2002.
-
(2002)
Know Your Enemy
-
-
-
8
-
-
84860051173
-
-
http://www.honeynet.org/papers/stats/
-
-
-
-
9
-
-
33845567241
-
Behavioral footprinting: A new dimension to characterize self-propagating worms
-
Purdue University, January
-
X. Jiang and D. Xu, Behavioral Footprinting: a New Dimension to Characterize Self-Propagating Worms, Department of Computer Science Technical Report, Purdue University, January 2005.
-
(2005)
Department of Computer Science Technical Report
-
-
Jiang, X.1
Xu, D.2
-
10
-
-
0001457509
-
Some methods for classification and analysis of multivariate observations
-
L. M. LeCam and J. Neyman, editors, University of California Press, Berkley, CA
-
J. B. MacQueen, Some Methods For Classification and Analysis of Multivariate Observations, in Proc. Fifth Berkeley Symposium on Mathematical Statistic and Probability, L. M. LeCam and J. Neyman, editors, University of California Press, Berkley, CA, 1967, pp 281-297.
-
(1967)
Proc. Fifth Berkeley Symposium on Mathematical Statistic and Probability
, pp. 281-297
-
-
MacQueen, J.B.1
-
11
-
-
84860053064
-
-
http://sourceforge.net/projects/nettime
-
-
-
-
12
-
-
27544493249
-
An experimental evaluation to determine if port scans are precursors to an attack
-
Yokohama, Japan, June 28-July 1
-
S. Panjwani, S. Tan, K. Jarrin, and M. Cukier, An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack, in Proc. International Conference on Dependable Systems and Networks (DSN-2005), Yokohama, Japan, June 28-July 1, 2005.
-
(2005)
Proc. International Conference on Dependable Systems and Networks (DSN-2005)
-
-
Panjwani, S.1
Tan, S.2
Jarrin, K.3
Cukier, M.4
-
13
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, November 5-8
-
L. Portnoy, E. Eskin and S. J. Stolfo, Intrusion detection with unlabeled data using clustering, in Proc. ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), Philadelphia, PA, November 5-8, 2001.
-
(2001)
Proc. ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001)
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.J.3
-
14
-
-
26444580931
-
Honeypot-based forensics
-
Ashmore, Australia, May 23-27
-
F. Pouget and M. Dacier, Honeypot-based Forensics, in Proc. AusCERT Information Technology Security Conference 2004 (AusCERT04), Ashmore, Australia, May 23-27, 2004.
-
(2004)
Proc. AusCERT Information Technology Security Conference 2004 (AusCERT04)
-
-
Pouget, F.1
Dacier, M.2
-
15
-
-
84860045309
-
-
http://www.cs.waikato.ac.nz/ml/weka/
-
-
-
-
16
-
-
0003957032
-
-
Department of Computer Science, University of Waikato, New Zealand
-
I. H. Witten, E. Frank, L. Trigg, M. Hall, G. Holmes, and S. J. Cunningham, Weka: Practical Machine Learning Tools and Techniques with Java Implementations, Department of Computer Science, University of Waikato, New Zealand.
-
Weka: Practical Machine Learning Tools and Techniques with Java Implementations
-
-
Witten, I.H.1
Frank, E.2
Trigg, L.3
Hall, M.4
Holmes, G.5
Cunningham, S.J.6
|