-
1
-
-
4544229404
-
ADAM: Detecting Intrusions by Data Mining
-
D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu, "ADAM: Detecting Intrusions by Data Mining," Proc. IEEE Workshop Information Assurance and Security, 2001.
-
(2001)
Proc. IEEE Workshop Information Assurance and Security
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
2
-
-
0036088611
-
Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods Performance
-
D.J. Burroughs, L.F. Wilson, and G.V. Cybenko, "Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods Performance," Proc. IEEE Int'l Computing and Comm. Conf., pp. 329-334, 2002.
-
(2002)
Proc. IEEE Int'l Computing and Comm. Conf
, pp. 329-334
-
-
Burroughs, D.J.1
Wilson, L.F.2
Cybenko, G.V.3
-
3
-
-
33847742744
-
WormShield: Fast Worm Signature Generation Using Distributed Fingerprint Aggregation
-
to be published in
-
M. Cai, K. Hwang, J. Pan, and C. Papadupolous, "WormShield: Fast Worm Signature Generation Using Distributed Fingerprint Aggregation," to be published in IEEE Trans. Dependabk and Secure Computing, 2007.
-
(2007)
IEEE Trans. Dependabk and Secure Computing
-
-
Cai, M.1
Hwang, K.2
Pan, J.3
Papadupolous, C.4
-
4
-
-
33847324610
-
SNORT 2.1, Intrusion Detection
-
second ed, May
-
B. Casewell and J. Beale, SNORT 2.1, Intrusion Detection, second ed. Syngress, May 2004.
-
(2004)
Syngress
-
-
Casewell, B.1
Beale, J.2
-
6
-
-
84867339043
-
Alert Correlation in a Cooperative Intrusion Detection Framework
-
F. Cuppens and A. Miege, "Alert Correlation in a Cooperative Intrusion Detection Framework," Proc. 2002 IEEE Symp. Security and Privacy, pp. 187-200, 2002.
-
(2002)
Proc. 2002 IEEE Symp. Security and Privacy
, pp. 187-200
-
-
Cuppens, F.1
Miege, A.2
-
7
-
-
33745441630
-
The MINDS - Minnesota Intrusion Detection System
-
MIT Press
-
L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, J. Srivastava, V. Kumar, and P. Dokas, "The MINDS - Minnesota Intrusion Detection System," Next Generation Data Mining, MIT Press, 2004.
-
(2004)
Next Generation Data Mining
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Srivastava, J.5
Kumar, V.6
Dokas, P.7
-
8
-
-
0141797880
-
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
Kluwer Academic Publishers
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data," Applications of Data Mining in Computer Security, Kluwer Academic Publishers, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
9
-
-
0000550189
-
A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
-
M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise," Proc. Second Int'l Conf. Knowledge Discovery and Data Mining, 1996.
-
(1996)
Proc. Second Int'l Conf. Knowledge Discovery and Data Mining
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
10
-
-
0142095474
-
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions
-
Nov
-
W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan, "Using Artificial Anomalies to Detect Unknown and Known Network Intrusions," Proc. First IEEE Int'l Conf. Data Mining, Nov. 2001.
-
(2001)
Proc. First IEEE Int'l Conf. Data Mining
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
12
-
-
0035416013
-
Difficulties in Simulating the Internet
-
Aug
-
S. Floyd and V. Paxson, "Difficulties in Simulating the Internet," IEEE/ACM Trans. Networking, vol. 9, no. 4, pp. 392-403, Aug. 2001.
-
(2001)
IEEE/ACM Trans. Networking
, vol.9
, Issue.4
, pp. 392-403
-
-
Floyd, S.1
Paxson, V.2
-
14
-
-
33846144789
-
DHT-Based Security Infrastructure for Trusted Internet and Grid Computing
-
Dec
-
K. Hwang, Y. Kwok, S. Song, M. Cai, Y. Chen, and Y. Chen, "DHT-Based Security Infrastructure for Trusted Internet and Grid Computing," Int'l J. Critical Infrastructures, vol. 2, no. 4, pp. 412-433, Dec. 2006.
-
(2006)
Int'l J. Critical Infrastructures
, vol.2
, Issue.4
, pp. 412-433
-
-
Hwang, K.1
Kwok, Y.2
Song, S.3
Cai, M.4
Chen, Y.5
Chen, Y.6
-
17
-
-
0242476921
-
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," Proc. Third SIAM Conf. Data Mining, 2003, http://www.users.cs.umn.edu/kumar/papers.
-
(2003)
Proc. Third SIAM Conf. Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
18
-
-
0034455983
-
Adaptive Intrusion Detection: A Data Mining Approach
-
Kluwer Academic Publishers, Dec
-
W. Lee, S.J. Stolfo, and K. Mok, "Adaptive Intrusion Detection: A Data Mining Approach," Artificial Intelligence Rev., vol. 14, no. 6, pp. 533-567, Kluwer Academic Publishers, Dec. 2000.
-
(2000)
Artificial Intelligence Rev
, vol.14
, Issue.6
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
20
-
-
84944222170
-
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
-
H. Debar, L. Me, and S.F. Wu, eds, pp
-
R.P. Lippmann and J. Haines, "Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation," Proc. Third Int'l Workshop Recent Advances in Intrusion Detection (RAID '00), H. Debar, L. Me, and S.F. Wu, eds., pp. 162-182, 2000.
-
(2000)
Proc. Third Int'l Workshop Recent Advances in Intrusion Detection (RAID '00)
, pp. 162-182
-
-
Lippmann, R.P.1
Haines, J.2
-
21
-
-
35248857893
-
An Analysis of the 1999 DARPA/ Lincoln Lab Evaluation Data for Network Anomaly Detection
-
Sept
-
M.V. Mahoney and P.K. Chan, "An Analysis of the 1999 DARPA/ Lincoln Lab Evaluation Data for Network Anomaly Detection," Proc. Int'l Symp. Recent Advances in Intrusion Detection, pp. 220-237, Sept. 2003.
-
(2003)
Proc. Int'l Symp. Recent Advances in Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
23
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Off-line Intrusion Detection System Evaluation as Performed by Lincoln Laboratory
-
Nov
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Off-line Intrusion Detection System Evaluation as Performed by Lincoln Laboratory," ACM Trans. Information and System Security, vol. 3, no. 4, Nov. 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
24
-
-
84883386223
-
Abstraction-Based Intrusion Detection in Distributed Environments
-
Nov
-
P. Ning, S. Jajodia, and X.S. Wang, "Abstraction-Based Intrusion Detection in Distributed Environments," ACM Trans. Information and System Security, vol. 4, no. 4, pp. 407-452, Nov. 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.4
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
25
-
-
0038282217
-
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
-
D. Barbara and S. Jajodia, eds, Kluwer Academic Publishers
-
S. Noel, D. Wijesekera, and C. Youman, "Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt," Applications of Data Mining in Computer Security, D. Barbara and S. Jajodia, eds., Kluwer Academic Publishers, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
26
-
-
85084164413
-
Bro: A System for Detecting Network Intrusions in Real Time
-
V. Paxson, "Bro: A System for Detecting Network Intrusions in Real Time," Proc. Seventh USENIX Security Symp., 1998.
-
(1998)
Proc. Seventh USENIX Security Symp
-
-
Paxson, V.1
-
27
-
-
0002629036
-
EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
-
Oct
-
P.A. Porras and P.G. Neumann, "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances," Proc. 19th Nat'l Computer Security Conf., pp. 353-365, Oct. 1997.
-
(1997)
Proc. 19th Nat'l Computer Security Conf
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
29
-
-
0034499251
-
Adaptation Techniques for Intrusion Detection and Response Systems
-
Oct
-
D.J. Ragsdale, C.A. Carver, J. Humphries, and U. Pooch, "Adaptation Techniques for Intrusion Detection and Response Systems," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, pp. 2344-2349, Oct. 2000.
-
(2000)
Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics
, pp. 2344-2349
-
-
Ragsdale, D.J.1
Carver, C.A.2
Humphries, J.3
Pooch, U.4
-
32
-
-
77952367550
-
Weighted Association Rule Mining Using Weighted Support and Significance Framework
-
F. Tao, F. Murtagh, and M. Farid, "Weighted Association Rule Mining Using Weighted Support and Significance Framework," Proc. Ninth ACM Int'l Conf. Knowkdge Discovery and Data Mining (SIGKDD), pp. 661-666, 2003.
-
(2003)
Proc. Ninth ACM Int'l Conf. Knowkdge Discovery and Data Mining (SIGKDD)
, pp. 661-666
-
-
Tao, F.1
Murtagh, F.2
Farid, M.3
-
33
-
-
0029756282
-
Cooperating Security Managers: A Peer-Based Intrusion Detection System
-
Jan
-
G.B. White, E.A. Fisch, and U.W. Pooch, "Cooperating Security Managers: A Peer-Based Intrusion Detection System," IEEE Network, pp. 20-23, Jan. 1996.
-
(1996)
IEEE Network
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
34
-
-
34548333324
-
Seurat: A Pointillist Approach to Anomaly Detection
-
Y. Xie, H. Kim, D.R. O'Hallaron, M.K. Reiter, and H. Zhang, "Seurat: A Pointillist Approach to Anomaly Detection," Proc. Seventh Int'l Symp. Recent Advances in Intrusion Detection (RAID '04), 2004.
-
(2004)
Proc. Seventh Int'l Symp. Recent Advances in Intrusion Detection (RAID '04)
-
-
Xie, Y.1
Kim, H.2
O'Hallaron, D.R.3
Reiter, M.K.4
Zhang, H.5
|