-
2
-
-
0032676506
-
A Data Mining Framework for Building Intrusion Detection Model
-
Gong L, Reiter M.K, eds, Oakland, CA: IEEE Computer Society Press
-
Lee, W.K., Stolfo, S.J.: A Data Mining Framework for Building Intrusion Detection Model. In: Gong L., Reiter M.K. (eds.): Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press (1999) 120-132
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.K.1
Stolfo, S.J.2
-
4
-
-
0036804084
-
Defending against flooding-based, distributed denial-of-service attacks: A tutorial
-
Chang, R. K. C. Defending against flooding-based, distributed denial-of-service attacks: A tutorial, IEEE Communications Magazine 40(10), (2002) 42-51.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
5
-
-
84942256107
-
-
Feinstein, L., Schnackenberg, D.: Statistical Approaches to DDoS Attack Detection and Response. Proceedings of the DARPA Information Survivability Conference and Expostion(DISCEX'03), (2003) 3030314
-
Feinstein, L., Schnackenberg, D.: Statistical Approaches to DDoS Attack Detection and Response. Proceedings of the DARPA Information Survivability Conference and Expostion(DISCEX'03), (2003) 3030314
-
-
-
-
6
-
-
35048886560
-
Using Inductive Learning for the Detection of Distributed Denial of Service Attacks
-
Noh S., Lee C., Jung, G., Choi, K.: Using Inductive Learning for the Detection of Distributed Denial of Service Attacks, Lecture Notes in Computer Science, LNCS 2690, (2003) 286-295
-
(2003)
Lecture Notes in Computer Science, LNCS
, vol.2690
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Jung, G.3
Choi, K.4
-
8
-
-
8344244591
-
An Approach to Reliably Identifying Signs of DDoS Flood Attacks Based on LRD Traffic Pattern Recognition
-
Li, M.: An Approach to Reliably Identifying Signs of DDoS Flood Attacks Based on LRD Traffic Pattern Recognition. Computer and Security, 23(7), (2004) 549-558.
-
(2004)
Computer and Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
9
-
-
33646829582
-
Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop
-
Proc. of GCC Workshops
-
Seo, J., Lee, C., Moon J.: Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. In Proc. of GCC 2004 Workshops, LNCS, Volume 3252, (2004) 390-397
-
(2004)
LNCS
, vol.3252
, pp. 390-397
-
-
Seo, J.1
Lee, C.2
Moon, J.3
-
10
-
-
84904888755
-
Attacking DDoS at the Source
-
Paris, France
-
Mirkovic, J., Prier, G. & Reiher, P.: Attacking DDoS at the Source, in Proceedings of International Conference on Network Protocols, Paris, France, (2002) 312-321.
-
(2002)
Proceedings of International Conference on Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
11
-
-
24644432749
-
Christopher, Kotagiri L, R.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Ad-dress Monitoring
-
Berlin Heidelberg, Springer
-
Peng, T., Christopher, Kotagiri L, R.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Ad-dress Monitoring, in Proceedings of the Third International IFIP-TC6 Networking Conference, Berlin Heidelberg, Springer, (2004) 771-782
-
(2004)
Proceedings of the Third International IFIP-TC6 Networking Conference
, pp. 771-782
-
-
Peng, T.1
-
12
-
-
0024610919
-
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
-
Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE, 77(2), (1986) 257-286
-
(1986)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
13
-
-
0003375670
-
An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
-
Paxson, V,: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. Computer Communication Review 31(3), (2001) 76-89
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
, pp. 76-89
-
-
Paxson, V.1
-
14
-
-
38049152816
-
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs
-
Proc. of 8th Australasian Conference on Information Security and Privacy, Wollongong, Australia
-
Peng, T., Leckie, C., and Kotagiri, R.: Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs, in Proc. of 8th Australasian Conference on Information Security and Privacy, Wollongong, Australia, Lecture Notes in Computer Science, LNCS 2727, (2003) 214-225
-
(2003)
Lecture Notes in Computer Science, LNCS
, vol.2727
, pp. 214-225
-
-
Peng, T.1
Leckie, C.2
Kotagiri, R.3
-
15
-
-
77953077374
-
Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites
-
Honolulu, Hawaii, USA
-
Jung, J., Krishnamurthy, B. and Rabinovich, M..: Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In Proceeding of 11th Word Wide Web conference. Honolulu, Hawaii, USA. (2002)
-
(2002)
Proceeding of 11th Word Wide Web conference
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
16
-
-
0004102479
-
-
MIT Press, Cambridge, MA
-
Sutton, R., and Barto, A. G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge, MA, (1998).
-
(1998)
Reinforcement Learning: An Introduction
-
-
Sutton, R.1
Barto, A.G.2
-
17
-
-
0000929496
-
Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm
-
Hu, J., Wellman, M. P.: Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm. In 15th Intl Conference on Machine Learning, (1998) 242-250.
-
(1998)
15th Intl Conference on Machine Learning
, pp. 242-250
-
-
Hu, J.1
Wellman, M.P.2
-
18
-
-
27144512114
-
A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls
-
Xu, X.: A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls. Lecture Notes in Computer Science, LNCS 3644, (2005) 995-1003
-
(2005)
Lecture Notes in Computer Science, LNCS
, vol.3644
, pp. 995-1003
-
-
Xu, X.1
|