-
1
-
-
0003964874
-
Next-generation intrusion detection expert system (NIDES): A summary
-
95. Menlo Park, CA. 28-42
-
ANDERSON, D., FRIVOLD, T., AND VALDES, A. 1995. Next-generation intrusion detection expert system (NIDES): A summary. In SRI International Technical Report. Vol. 95. Menlo Park, CA. 28-42.
-
(1995)
SRI International Technical Report
-
-
ANDERSON, D.1
FRIVOLD, T.2
VALDES, A.3
-
2
-
-
35148897246
-
Robust classification in high dimensional data
-
Prague, Czech Republic, 2004
-
BRANDEN, K. AND HUBERT, M. 2004. Robust classification in high dimensional data. In Proceedings in Computational Statistics. Prague, Czech Republic, 1925-1932.
-
(1925)
Proceedings in Computational Statistics
-
-
BRANDEN, K.1
HUBERT, M.2
-
4
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
Dallas, TX
-
BREUNING, M. M., KRIEGEL, H.-P., NG, R. T., AND SANDER, J. 2000. LOF: Identifying density-based local outliers. In Proceedings of the ACM SIGMOD Conference. Dallas, TX. 93-104.
-
(2000)
Proceedings of the ACM SIGMOD Conference
, pp. 93-104
-
-
BREUNING, M.M.1
KRIEGEL, H.-P.2
NG, R.T.3
SANDER, J.4
-
5
-
-
80052862897
-
-
CLARK, D. 2001. Rethinking the design of the internet: end to end arguments vs. the brave new world. ACM Trans. Inter. Tech. 1, 1 (Sept.), 70-109.
-
CLARK, D. 2001. Rethinking the design of the internet: end to end arguments vs. the brave new world. ACM Trans. Inter. Tech. 1, 1 (Sept.), 70-109.
-
-
-
-
6
-
-
84858362567
-
-
DARPA, data sets, available at
-
DARPA 2007. Intrusion detection evaluation data sets, available at http://www.ll.mit.edu/.
-
(2007)
Intrusion detection evaluation
-
-
-
7
-
-
84858346891
-
-
internet traffic generator, available at
-
D-ITG. 2006. Distributed internet traffic generator, available at http://www.grid.umna. it/software/ITG/.
-
(2006)
Distributed
-
-
D-ITG1
-
8
-
-
84964461159
-
-
DASGUPTA, D. AND BRIAN, H. 2001. Mobile security agents for network traffic analysis. In DARPA Information Survivability Conference and Exposition (DISCEX II'01). 2. Anaheim, CA. 332-340.
-
DASGUPTA, D. AND BRIAN, H. 2001. Mobile security agents for network traffic analysis. In DARPA Information Survivability Conference and Exposition (DISCEX II'01). Vol. 2. Anaheim, CA. 332-340.
-
-
-
-
9
-
-
24944527971
-
-
MIT Press, Cambridge, MA
-
ERTOZ, L., EILERTSON, E., LAZAREVIC, A., TAN, P., SRIVASTAVA, J., KUMAR, V., AND DOKAS, R 2004. The MINDS-Minnesota Intrusion Detection System, Next Generation Data Mining. MIT Press, Cambridge, MA.
-
(2004)
The MINDS-Minnesota Intrusion Detection System, Next Generation Data Mining
-
-
ERTOZ, L.1
EILERTSON, E.2
LAZAREVIC, A.3
TAN, P.4
SRIVASTAVA, J.5
KUMAR, V.6
DOKAS, R.7
-
11
-
-
35148877730
-
-
FOUKIA, N., HULAAS, J., AND HARMS, J. 2001. Intrusion detection with mobile agents. In Proceedings of the 11th Annual Internet Society Conference. Stockholm, Sweeden.
-
FOUKIA, N., HULAAS, J., AND HARMS, J. 2001. Intrusion detection with mobile agents. In Proceedings of the 11th Annual Internet Society Conference. Stockholm, Sweeden.
-
-
-
-
12
-
-
33847344323
-
-
Chapman and Hall, Boca Raton, FL, USA
-
GREENACRE, M. AND BLASIUS, J. 2006. Multiple Correspondence Analysis and Related Methods. Chapman and Hall, Boca Raton, FL, USA.
-
(2006)
Multiple Correspondence Analysis and Related Methods
-
-
GREENACRE, M.1
BLASIUS, J.2
-
14
-
-
84858362904
-
-
available at
-
HAN, B. 2003. Support vector machines, available at http://www.ist.temple.edu/~vucetic/ cis526fall2003/lecture8.doc.
-
(2003)
Support vector machines
-
-
HAN, B.1
-
15
-
-
0038729639
-
Lightweight agents for intrusion detection
-
HELMER, G., WONG, J., S. K., J., HONAVAR, V., MILLER, L., AND WANG, Y. 2003. Lightweight agents for intrusion detection. J. Syst. Softw. 67, 109-122.
-
(2003)
J. Syst. Softw
, vol.67
, pp. 109-122
-
-
HELMER, G.1
WONG, J.S.K.J.2
HONAVAR, V.3
MILLER, L.4
WANG, Y.5
-
16
-
-
0027593257
-
NADIR: An automated system for detecting network intrusions and misuse
-
May
-
HOCHBERG, J., JACKSON, K., STALLINGS, C., MCCLARY, J., DUBOIS, D., AND FORD, J. 1993. NADIR: An automated system for detecting network intrusions and misuse. Comput. Secur. 12, 3 (May), 235-248.
-
(1993)
Comput. Secur
, vol.12
, Issue.3
, pp. 235-248
-
-
HOCHBERG, J.1
JACKSON, K.2
STALLINGS, C.3
MCCLARY, J.4
DUBOIS, D.5
FORD, J.6
-
17
-
-
0033243646
-
Reference point logistic classification
-
HOOPER, R 1999. Reference point logistic classification. J. Classif. 16, 91-116.
-
(1999)
J. Classif
, vol.16
, pp. 91-116
-
-
HOOPER, R.1
-
18
-
-
35148819705
-
-
INSECUREORG. 2006. Nmap free security scanner, tools and hacking resources, available at http://insecure.org.
-
INSECUREORG. 2006. Nmap free security scanner, tools and hacking resources, available at http://insecure.org.
-
-
-
-
19
-
-
35148839934
-
-
JACOBSON, V., LERES, C., AND MCCANNE, S. 2007. Tcpdump, available at anonymous@ftp.ee.lbl. gov.
-
JACOBSON, V., LERES, C., AND MCCANNE, S. 2007. Tcpdump, available at anonymous@ftp.ee.lbl. gov.
-
-
-
-
21
-
-
0141723181
-
-
KDD, Data, available at
-
KDD. 1999. KDD Cup 1999 Data, available at http://kdd.ics.uci.edu/ databases/kddcup99/.
-
(1999)
KDD Cup 1999
-
-
-
22
-
-
0000911288
-
The state of the art in agent communication lan-guages
-
KONE, M., SHIMAZU, A., AND NAKAJIMA, T. 2000. The state of the art in agent communication lan-guages. Knowl. and Inform. Syst. 2, 3, 259-284.
-
(2000)
Knowl. and Inform. Syst
, vol.2
, Issue.3
, pp. 259-284
-
-
KONE, M.1
SHIMAZU, A.2
NAKAJIMA, T.3
-
23
-
-
33745907909
-
Detecting and visualizing Denial-of-Service and network probe attacks using principal component analysis
-
La Londe, France
-
LABIB, K. AND VEMURI, V. 2004. Detecting and visualizing Denial-of-Service and network probe attacks using principal component analysis. In Third Conference on Security and Network Architectures (SAR'04). La Londe, France.
-
(2004)
Third Conference on Security and Network Architectures (SAR'04)
-
-
LABIB, K.1
VEMURI, V.2
-
24
-
-
0242476921
-
A comparative study of anomaly detection schemes in network intrusion detection
-
San Francisco, CA
-
LAZAREVIC, A., ERTOZ, L., KUMAR, V., OZGUR, A., AND SRIVASTAVA, J. 2003. A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the Third SIAM Conference on Data Mining. San Francisco, CA.
-
(2003)
Proceedings of the Third SIAM Conference on Data Mining
-
-
LAZAREVIC, A.1
ERTOZ, L.2
KUMAR, V.3
OZGUR, A.4
SRIVASTAVA, J.5
-
25
-
-
84885774862
-
-
LEE, W AND STOLFO, S. 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Secur. 3, 4 (Nov.), 227-261.
-
LEE, W AND STOLFO, S. 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Secur. 3, 4 (Nov.), 227-261.
-
-
-
-
26
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
LIAO, Y AND VEMURI, V 2002. Use of K-nearest neighbor classifier for intrusion detection. Comput. Secur. 5, 5, 439-448.
-
(2002)
Comput. Secur
, vol.5
, Issue.5
, pp. 439-448
-
-
LIAO, Y.1
VEMURI, V.2
-
27
-
-
84858357876
-
-
available at
-
LIBCAP. 2007. Libcap. available at http://www.tcpdump.org.
-
(2007)
Libcap
-
-
LIBCAP1
-
28
-
-
0003602164
-
-
Kluwer Academic Publishers, Boston, MA
-
LIU, H. AND MOTODA, H. 1998. Feature Extraction, Construction and Selection: A Data Mining Perspective. Kluwer Academic Publishers, Boston, MA.
-
(1998)
Feature Extraction, Construction and Selection: A Data Mining Perspective
-
-
LIU, H.1
MOTODA, H.2
-
29
-
-
7444252802
-
Active feature selection using classes
-
Seoul, Korea
-
LIU, H., YU, L., MANORANJAN, D., AND MOTODA, H. 2003. Active feature selection using classes. In Proceedings of Seventh Pacific-Asia Conference on Knowledge Discovery and Data Mining. Seoul, Korea, 474-485.
-
(2003)
Proceedings of Seventh Pacific-Asia Conference on Knowledge Discovery and Data Mining
, pp. 474-485
-
-
LIU, H.1
YU, L.2
MANORANJAN, D.3
MOTODA, H.4
-
30
-
-
84875379930
-
-
MATHWORKS, available at
-
MATHWORKS. 2007. Matlab. available at http://www.mathworks.com/ matlabcentral/.
-
(2007)
Matlab
-
-
-
31
-
-
85084161486
-
Inferring internet Denial-of-Service activity
-
Washington, D.C
-
MOORE, D., VOELKER, G., AND SAVAGE, S. 2001. Inferring internet Denial-of-Service activity. In Usenix Security Symposium. Washington, D.C 9-22.
-
(2001)
Usenix Security Symposium
, pp. 9-22
-
-
MOORE, D.1
VOELKER, G.2
SAVAGE, S.3
-
33
-
-
84858349508
-
-
Irs. available at
-
OXID. 2006. Irs. available at http://http://www.oxid.it/irs. html.
-
(2006)
-
-
OXID1
-
34
-
-
0027928121
-
View-based and modu-lar eigenspaces for face recognition
-
Seattle, WA
-
PENTLAND, A., MOGHADDAM, B., STARNER, T., OLIYIDE, O., AND TURK, M. 1994. View-based and modu-lar eigenspaces for face recognition. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR'94). Seattle, WA, 84-91.
-
(1994)
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR'94)
, pp. 84-91
-
-
PENTLAND, A.1
MOGHADDAM, B.2
STARNER, T.3
OLIYIDE, O.4
TURK, M.5
-
36
-
-
35148852677
-
-
SINGH, M. 1999. A social semantics for agent communication languages. In Proceedings of IJCAI99 Workshop on Agent Communication Languages. Stockholm, Scandinavia, 75-88.
-
SINGH, M. 1999. A social semantics for agent communication languages. In Proceedings of IJCAI99 Workshop on Agent Communication Languages. Stockholm, Scandinavia, 75-88.
-
-
-
-
37
-
-
0002473030
-
DIDS (distributed intrusion detection system)motivation, architecture, and an early prototype
-
Washington D.C
-
SNAPP, S., BRETANO, J., DIAS, G., GOAN, T., HEBERLEIN, L., HO, C., LEVITT, K., MUKHERJEE, B., SMAHA, S., GRANCE, T., TEAL, D., AND MANSUR, D. 1991. DIDS (distributed intrusion detection system)motivation, architecture, and an early prototype. In Proceedings of the 14th National Computer Science Conference. Washington D.C. 167-176.
-
(1991)
Proceedings of the 14th National Computer Science Conference
, pp. 167-176
-
-
SNAPP, S.1
BRETANO, J.2
DIAS, G.3
GOAN, T.4
HEBERLEIN, L.5
HO, C.6
LEVITT, K.7
MUKHERJEE, B.8
SMAHA, S.9
GRANCE, T.10
TEAL, D.11
MANSUR, D.12
-
38
-
-
0034300682
-
-
SPAFFORD, E. AND ZAMBONI, D. 2000. Intrusion detection using autonomous agents. Comput. Netw. 34, 4 (Oct.), 547-570.
-
SPAFFORD, E. AND ZAMBONI, D. 2000. Intrusion detection using autonomous agents. Comput. Netw. 34, 4 (Oct.), 547-570.
-
-
-
-
39
-
-
84858349507
-
-
TCPTRACE, available at
-
TCPTRACE. 2007. available at http://www.tcptrace.org.
-
(2007)
-
-
-
42
-
-
0037105910
-
Intrusion detection techniques and approaches
-
VERWORED, T. AND HUNT, R. 2002. Intrusion detection techniques and approaches. Comput. Comm. 25, 1356-1365.
-
(2002)
Comput. Comm
, vol.25
, pp. 1356-1365
-
-
VERWORED, T.1
HUNT, R.2
-
43
-
-
84858361154
-
-
available at
-
WEKA. 2007. Weka. available at http://www.cs.waikato.ac.nz/ml/ weka/.
-
(2007)
Weka
-
-
WEKA1
-
44
-
-
33845409757
-
A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classier
-
Taichung, Taiwan, R.O.C
-
XIE, Z., QUIRINO, T., SHYU, M.-L., CHEN, S.-C, AND CHANG, L. 2006. A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classier. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006). Taichung, Taiwan, R.O.C, 446-453.
-
(2006)
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006)
, pp. 446-453
-
-
XIE, Z.1
QUIRINO, T.2
SHYU, M.-L.3
CHEN, S.-C.4
CHANG, L.5
|