-
1
-
-
0036804084
-
"Defending against flooding based distributed denial-of-service attacks: A tutorial"
-
Oct
-
R. K. C. Chang, "Defending against flooding based distributed denial-of-service attacks: A tutorial," IEEE Commun. Mag., vol. 40, no. 10, pp. 42-51, Oct. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
2
-
-
0023294428
-
"An intrusion-detection model"
-
Feb
-
D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
3
-
-
0003964874
-
"Next-generation intrusion detection expert system (NIDES): A summary"
-
SRI Int., Menlo Park, CA, Tech. Rep. SRI-CSL-97-07
-
D. Anderson, T. Frivold, and A. Valdes, "Next-generation intrusion detection expert system (NIDES): A summary," SRI Int., Menlo Park, CA, Tech. Rep. SRI-CSL-97-07, 1995.
-
(1995)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
4
-
-
0004118981
-
"The NIDES statistical component description of justification"
-
SRI Int., Menlo Park, CA, Tech. Rep. A010
-
H. S. Javitz and A. Valdes, "The NIDES statistical component description of justification," SRI Int., Menlo Park, CA, Tech. Rep. A010, 1994.
-
(1994)
-
-
Javitz, H.S.1
Valdes, A.2
-
6
-
-
0036647172
-
"Multivariate statistical analysis of audit trails for host-based intrusion detection"
-
Jul
-
N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol. 51, no. 7, pp. 810-820, Jul. 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
7
-
-
84942256107
-
"Statistical approaches to DDoS attack detection and response"
-
in Apr
-
L. Feinstein and D. Schnackenberg, "Statistical approaches to DDoS attack detection and response," in Proc. DISCEX, Apr. 2003, vol. 1, pp. 303-314.
-
(2003)
Proc. DISCEX
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
-
8
-
-
0036804085
-
"Network intrusion and fault detection: A statistical anomaly approach"
-
Oct
-
C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Commun. Mag., vol. 40, no. 10, pp. 76-82, Oct. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
9
-
-
4143081502
-
"A covariance analysis model for DDoS attack detection"
-
in Jun
-
S. Jin and D. Yeung, "A covariance analysis model for DDoS attack detection," in Proc. IEEE ICC, Jun. 2004, vol. 4, pp. 20-24.
-
(2004)
Proc. IEEE ICC
, vol.4
, pp. 20-24
-
-
Jin, S.1
Yeung, D.2
-
10
-
-
1642535783
-
"A novel approach to detection of denial-of-service attacks via adaptive sequential and batch-sequential change-point detection methods"
-
in Jun
-
R. B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of denial-of-service attacks via adaptive sequential and batch-sequential change-point detection methods," in Proc. Workshop Stat. and Mach. Learn. Tech. Comput. Intrusion Detect., Jun. 2001, pp. 220-226.
-
(2001)
Proc. Workshop Stat. and Mach. Learn. Tech. Comput. Intrusion Detect.
, pp. 220-226
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
11
-
-
0043166339
-
"Anomaly detection in IP networks"
-
Aug
-
M. Thottan and C. Ji, "Anomaly detection in IP networks," IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
12
-
-
14644397228
-
"Change-point monitoring for the detection of DoS attacks"
-
Oct.-Dec
-
H. Wang, D. Zhang, and K. G. Shin, "Change-point monitoring for the detection of DoS attacks," IEEE Trans. Dependable Secur. Comput., vol. 1, no. 4, pp. 193-208, Oct.-Dec. 2004.
-
(2004)
IEEE Trans. Dependable Secur. Comput.
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
13
-
-
84885774862
-
"A framework for constructing features and models for intrusion detection systems"
-
Nov
-
W. Lee and S. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
14
-
-
0013458787
-
"Sustaining availability of Web services under severe denial of service attacks"
-
Georgia Inst. Technol., Atlanta, GA, Tech. Rep. GITCC-01-10, May
-
J. Xu, "Sustaining availability of Web services under severe denial of service attacks," Georgia Inst. Technol., Atlanta, GA, Tech. Rep. GITCC-01-10, May 2001.
-
(2001)
-
-
Xu, J.1
-
15
-
-
0004204719
-
"A data mining framework for constructing features and models for intrusion detection systems"
-
Ph.D. dissertation, Columbia Univ., New York
-
W. Lee, "A data mining framework for constructing features and models for intrusion detection systems," Ph.D. dissertation, Columbia Univ., New York, 1999.
-
(1999)
-
-
Lee, W.1
-
16
-
-
35248857893
-
"An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection"
-
in Oct
-
M. V. Mahoney and P. K. Chan, "An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection," in Proc. RAID, Oct. 2003, pp. 220-237.
-
(2003)
Proc. RAID
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
17
-
-
2942751146
-
"Experiences with specification-based intrusion detection"
-
in Oct
-
P. Uppuluri and R. Sekar, "Experiences with specification-based intrusion detection," in Proc. RAID, Oct. 2001, pp. 172-189.
-
(2001)
Proc. RAID
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
18
-
-
4544342574
-
"A specification-based intrusion detection system for AODV"
-
in Oct
-
C. Tseng, P. Balasubramanyam, and C. Ko, "A specification-based intrusion detection system for AODV," in Proc. 1st ACM Workshop Secur. Ad Hoc and Sensor Netw. Fairfax, Oct. 2003, pp. 125-134.
-
(2003)
Proc. 1st ACM Workshop Secur. Ad Hoc and Sensor Netw. Fairfax
, pp. 125-134
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
-
19
-
-
0141427794
-
"A signal analysis of network traffic anomalies"
-
in Nov
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in Proc. 2nd ACM SIGCOMM Workshop Internet Meas., Nov. 2002, pp. 71-82.
-
(2002)
Proc. 2nd ACM SIGCOMM Workshop Internet Meas.
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
20
-
-
85084161486
-
"Inferring internet denial of service activity"
-
in Aug
-
D. Moore, G. Voelker, and S. Savage, "Inferring internet denial of service activity," in Proc. USENIX Secur. Symp., Aug. 2001, pp. 9-22.
-
(2001)
Proc. USENIX Secur. Symp.
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
21
-
-
15044352886
-
"Theorems and fallacies in the theory of long-range-dependent processes"
-
Mar
-
J. A. Gubner, "Theorems and fallacies in the theory of long-range-dependent processes," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 1234-1239, Mar. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.3
, pp. 1234-1239
-
-
Gubner, J.A.1
-
22
-
-
6944226924
-
"Long-range dependence ten years of Internet traffic modelling"
-
Sep./Oct
-
T. Karagiannis, M. Molle, and M. Faloutsos, "Long-range dependence ten years of Internet traffic modelling," IEEE Internet Comput., vol. 8, no. 5, pp. 57-64, Sep./Oct. 2004.
-
(2004)
IEEE Internet Comput.
, vol.8
, Issue.5
, pp. 57-64
-
-
Karagiannis, T.1
Molle, M.2
Faloutsos, M.3
-
23
-
-
84898944587
-
"Intrusion detection with neural networks"
-
in Cambridge, MA: MIT Press
-
J. Ryan, M. J. Lin, and R. Miikkulainen, "Intrusion detection with neural networks," in Advances in Neural Information Processing. Cambridge, MA: MIT Press, 1998.
-
(1998)
Advances in Neural Information Processing
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
24
-
-
0035402092
-
"On the defense of the distributed denial of service attacks: An on-off feedback control approach"
-
Jul
-
Y. Xiong, S. Liu, and P. Sun, "On the defense of the distributed denial of service attacks: An on-off feedback control approach," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 282-293, Jul. 2001.
-
(2001)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.31
, Issue.4
, pp. 282-293
-
-
Xiong, Y.1
Liu, S.2
Sun, P.3
-
25
-
-
0038052872
-
"Random flow network modeling and simulations for DdoS attack mitigation"
-
in May
-
J. Kong, M. Mirza, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, "Random flow network modeling and simulations for DdoS attack mitigation," in Proc. IEEE ICC, May 2003, vol. 1, pp. 487-491.
-
(2003)
Proc. IEEE ICC
, vol.1
, pp. 487-491
-
-
Kong, J.1
Mirza, M.2
Shu, J.3
Yoedhana, C.4
Gerla, M.5
Lu, S.6
-
26
-
-
0032178150
-
"High speed policy-based packet forwarding using efficient multi-dimensional range matching"
-
in Sep
-
T. V. Lakshman and D. Stiliadis, "High speed policy-based packet forwarding using efficient multi-dimensional range matching," in Proc. ACM SIGCOMM, Sep. 1998, pp. 203-214.
-
(1998)
Proc. ACM SIGCOMM
, pp. 203-214
-
-
Lakshman, T.V.1
Stiliadis, D.2
-
27
-
-
77953077374
-
"Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites"
-
in Honolulu, HI, May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites," in Proc. 11th Int. World Wide Web Conf., Honolulu, HI, May 2002, pp. 252-262.
-
(2002)
Proc. 11th Int. World Wide Web Conf.
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
28
-
-
18144375196
-
"Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically"
-
in Nov./Dec
-
Y. Ohsita, S. Ata, and M. Murata, "Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically," in Proc. IEEE GLOBECOM, Nov./Dec. 2004, vol. 4, pp. 2043-2049.
-
(2004)
Proc. IEEE GLOBECOM
, vol.4
, pp. 2043-2049
-
-
Ohsita, Y.1
Ata, S.2
Murata, M.3
-
29
-
-
0037209446
-
"Host-based intrusion detection using dynamic and static behavioral models"
-
Jan
-
D. Y. Yeung and Y. X. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern Recognit., vol. 36, no. 1, pp. 229-243, Jan. 2003.
-
(2003)
Pattern Recognit.
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.X.2
-
30
-
-
84964411176
-
"Real time data mining-based intrusion detection"
-
in Jun
-
W. Lee, S. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, and J. Zhang, "Real time data mining-based intrusion detection," in Proc. DISCEX II, Jun. 2001, pp. 85-100.
-
(2001)
Proc. DISCEX II
, pp. 85-100
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
31
-
-
77958468530
-
"Supporting intrusion detection by graph clustering and graph drawing"
-
in Oct
-
J. Toelle and O. Niggenmann, "Supporting intrusion detection by graph clustering and graph drawing," in Proc. 3rd Int. Workshop RAID, Oct. 2000.
-
(2000)
Proc. 3rd Int. Workshop RAID
-
-
Toelle, J.1
Niggenmann, O.2
-
32
-
-
0026850007
-
"A neural network component for an intrusion detection system"
-
H. Debar, M. Becker, and D. Siboni, "A neural network component for an intrusion detection system," in Proc. IEEE Comput. Soc. Symp. Res. Comput. Secur. and Privacy, 1992, pp. 240-250.
-
(1992)
Proc. IEEE Comput. Soc. Symp. Res. Comput. Secur. and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
34
-
-
3242808612
-
-
San Francisco, CA: Comput. Secur. Inst. (CSI). [Online]. Available
-
L. A. Gordon, M. P. Loeb, W. Lucyshyn, and R. Richardson, 2004 CSI/FBI Computer Crime and Security Survey, 2004, San Francisco, CA: Comput. Secur. Inst. (CSI). [Online]. Available: http://i.cmpnet.com/gocsi/ db_area/pdfs/fbi/FBI2004.pdf
-
(2004)
2004 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
35
-
-
75449090970
-
-
2nd ed. Cambridge, U.K.: Cambridge Univ. Press, ch. 2.17 and 5.8, 123
-
G. H. Hardy, J. E. Littlewood, and G. Pólya, Chebychef's Inequality, 2nd ed. Cambridge, U.K.: Cambridge Univ. Press, 1988, ch. 2.17 and 5.8, pp. 43-45. 123.
-
(1988)
Chebychef's Inequality
, pp. 43-45
-
-
Hardy, G.H.1
Littlewood, J.E.2
Pólya, G.3
-
36
-
-
33947622776
-
"Using MIB II variables for network anomaly detection - A feasibility study"
-
in Philadelphia, PA, Nov
-
X. Qin, W. Lee, L. Lewis, and J. B. D. Cabrera, "Using MIB II variables for network anomaly detection - A feasibility study," in Proc. ACM Workshop Data Mining Secur. Appl., Philadelphia, PA, Nov. 2001, pp. 609-622.
-
(2001)
Proc. ACM Workshop Data Mining Secur. Appl.
, pp. 609-622
-
-
Qin, X.1
Lee, W.2
Lewis, L.3
Cabrera, J.B.D.4
|