-
1
-
-
39549123894
-
-
Cisco, Cisco IOS NetFlow Technology Data Sheet. .
-
Cisco, Cisco IOS NetFlow Technology Data Sheet. .
-
-
-
-
2
-
-
33846304450
-
Intrusion detection for viruses and worms
-
Chen T. Intrusion detection for viruses and worms. IEC Annual Review of Communications 57 Fall (2004)
-
(2004)
IEC Annual Review of Communications
, vol.57
, Issue.Fall
-
-
Chen, T.1
-
3
-
-
0036343692
-
Detecting SYN flooding attacks
-
INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
-
Wang H., Zhang D., and Shin K.G. Detecting SYN flooding attacks. INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE 3 23-27 (2002) 1530-1539
-
(2002)
Proceedings IEEE
, vol.3
, Issue.23-27
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
4
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Siris V.A., and Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks. Global Telecommunications Conference 29 3 (2004) 2050-2054
-
(2004)
Global Telecommunications Conference
, vol.29
, Issue.3
, pp. 2050-2054
-
-
Siris, V.A.1
Papagalou, F.2
-
5
-
-
39049163945
-
-
Seung-won Shin, Ki-young Kim, Jong-soo Jang, D-SAT: detecting SYN flooding attack by two-stage statistical approach, applications and the Internet, in: Proceedings, The 2005 Symposium on 31 January-4 February 2005, pp. 430-436.
-
Seung-won Shin, Ki-young Kim, Jong-soo Jang, D-SAT: detecting SYN flooding attack by two-stage statistical approach, applications and the Internet, in: Proceedings, The 2005 Symposium on 31 January-4 February 2005, pp. 430-436.
-
-
-
-
6
-
-
84949751558
-
-
J.B.D. Caberera, T.B. Ravichandran, R.K. Mehra, Statistical traffic modeling for network intrusion detection, in: Proceedings of 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2000, 29(1), 2000, pp. 466-473.
-
J.B.D. Caberera, T.B. Ravichandran, R.K. Mehra, Statistical traffic modeling for network intrusion detection, in: Proceedings of 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2000, 29(1), 2000, pp. 466-473.
-
-
-
-
7
-
-
0035792373
-
-
John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson, Fuzzy intrusion detection, in: IFSA World Congress and 20th NAFIPS International Conference 9(3), 2001, vol. 1506-1510.
-
John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson, Fuzzy intrusion detection, in: IFSA World Congress and 20th NAFIPS International Conference 9(3), 2001, vol. 1506-1510.
-
-
-
-
8
-
-
39649099852
-
-
R.C. Garcia, M.N.O. Sadiku, J.D. Cannady, WAID: wavelet analysis intrusion detection, circuits and systems, 2002, in: M-WSCAS-2002, The 2002 45th Midwest Symposium, vol. 3, 4-7 August 2002, pp. III-688-III-691.
-
R.C. Garcia, M.N.O. Sadiku, J.D. Cannady, WAID: wavelet analysis intrusion detection, circuits and systems, 2002, in: M-WSCAS-2002, The 2002 45th Midwest Symposium, vol. 3, 4-7 August 2002, pp. III-688-III-691.
-
-
-
-
9
-
-
84964555718
-
-
M. Li, W. Jia, W. Zhao, Decision analysis of network based intrusion detection systems for denial-of-service attacks, in: Proceedings, IEEE Conferences on Info-tech and Infonet, 2001.
-
M. Li, W. Jia, W. Zhao, Decision analysis of network based intrusion detection systems for denial-of-service attacks, in: Proceedings, IEEE Conferences on Info-tech and Infonet, 2001.
-
-
-
-
10
-
-
39649096612
-
-
Yiming Gong, Detecting Worms, and Anomaly Activities with NetFlow. .
-
Yiming Gong, Detecting Worms, and Anomaly Activities with NetFlow. .
-
-
-
-
12
-
-
39649086139
-
-
P. Huang, A. Feldmann, A.C. Gilbert, W. Willinger, Dynamics of ip traffic: a study of the role of variability and the impact of control, in: ACM SIGCOMM'99, vol. 29, Massachusetts, USA, 1999.
-
P. Huang, A. Feldmann, A.C. Gilbert, W. Willinger, Dynamics of ip traffic: a study of the role of variability and the impact of control, in: ACM SIGCOMM'99, vol. 29, Massachusetts, USA, 1999.
-
-
-
-
14
-
-
0026156486
-
-
Shiuh-Pyng Shieh, Virgil D. Gligor, A pattern-oriented intrusion detection system and its applications, in: Proceedings of IEEE symposium Research in Security and Privacy, Oakland, CA, May 1991, pp. 327-342.
-
Shiuh-Pyng Shieh, Virgil D. Gligor, A pattern-oriented intrusion detection system and its applications, in: Proceedings of IEEE symposium Research in Security and Privacy, Oakland, CA, May 1991, pp. 327-342.
-
-
-
-
15
-
-
39649118698
-
-
Sandeep Kumar, Eugene H. Spafford, A pattern matching model for misuse intrusion detection, in: Proceedings of the 17th National Computer security conference, Baltimore, MD, 1994.
-
Sandeep Kumar, Eugene H. Spafford, A pattern matching model for misuse intrusion detection, in: Proceedings of the 17th National Computer security conference, Baltimore, MD, 1994.
-
-
-
-
16
-
-
84964497101
-
-
C.J. Coit, S. Staniford, J. McAlemey, Towards faster string matching for intrusion detection or exceeding the speed of snort, in: DARPA Information Survivability Conference and Exposition (DISCEX II 01), Anaheim, CA, June 2001.
-
C.J. Coit, S. Staniford, J. McAlemey, Towards faster string matching for intrusion detection or exceeding the speed of snort, in: DARPA Information Survivability Conference and Exposition (DISCEX II 01), Anaheim, CA, June 2001.
-
-
-
-
19
-
-
0029323403
-
Wide-area traffic: the failure of Poisson modeling
-
Paxson V., and Floyd S. Wide-area traffic: the failure of Poisson modeling. IEEE/ACM Trans Networking 3 3 (1995)
-
(1995)
IEEE/ACM Trans Networking
, vol.3
, Issue.3
-
-
Paxson, V.1
Floyd, S.2
-
20
-
-
0842289254
-
-
T. Peng, C. Leckie, K. Ramamohanarao, Detecting reflector attacks by sharing beliefs, in: Proceedings of the IEEE 2003 Global Communications Conference (Globecom 2003), vol. 3, San Francisco, California, USA, 2003b, pp. 1358-1362.
-
T. Peng, C. Leckie, K. Ramamohanarao, Detecting reflector attacks by sharing beliefs, in: Proceedings of the IEEE 2003 Global Communications Conference (Globecom 2003), vol. 3, San Francisco, California, USA, 2003b, pp. 1358-1362.
-
-
-
-
21
-
-
33745371142
-
-
T. Peng, C. Leckie, K. Ramamohanarao, Proactively detecting DDoS attack using source IP address monitoring, in: Proceedings of Networking 2004, Athens, Greece, 2004, pp. 771-782.
-
T. Peng, C. Leckie, K. Ramamohanarao, Proactively detecting DDoS attack using source IP address monitoring, in: Proceedings of Networking 2004, Athens, Greece, 2004, pp. 771-782.
-
-
-
-
22
-
-
39649089230
-
-
Harold S. Javitz, Alfonso Valdes, The NIDES statistical component: description and justification, SRI International, March 1993.
-
Harold S. Javitz, Alfonso Valdes, The NIDES statistical component: description and justification, SRI International, March 1993.
-
-
-
-
23
-
-
39649109978
-
-
Zheng Zhang, Jun Li, C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West point, NY, 5-6 June, 2001.
-
Zheng Zhang, Jun Li, C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West point, NY, 5-6 June, 2001.
-
-
-
-
25
-
-
84940104123
-
-
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the 20th IEEE symposium on security and privacy, Oakland, CA 1999.
-
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, A data mining framework for building intrusion detection models, in: Proceedings of the 20th IEEE symposium on security and privacy, Oakland, CA 1999.
-
-
-
-
26
-
-
85084163349
-
-
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for Intrusion detection system, in: Proceedings of the 7th USENIX security symposium, San Antonio, TX, January, 1998.
-
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for Intrusion detection system, in: Proceedings of the 7th USENIX security symposium, San Antonio, TX, January, 1998.
-
-
-
-
27
-
-
39649124074
-
-
Bertrand Portier, Jerome Froment, Data mining techniques for Intrusion detection, Data mining term paper, The University of Texas, Spring, 2000.
-
Bertrand Portier, Jerome Froment, Data mining techniques for Intrusion detection, Data mining term paper, The University of Texas, Spring, 2000.
-
-
-
-
28
-
-
0036085392
-
-
Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung, Intrusion detection using neural networks and support vector machines, Appeared in IEEE IJCNN, May 2002.
-
Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung, Intrusion detection using neural networks and support vector machines, Appeared in IEEE IJCNN, May 2002.
-
-
-
-
29
-
-
0026850007
-
-
Herve Debar, Monique Becker, Didier Siboni, A neural network component for an Intrusion Detection System, in: Proceedings of the 1992 IEEE computer Society Symposium on research in Computer Security and Privacy, 1992, pp. 240-250.
-
Herve Debar, Monique Becker, Didier Siboni, A neural network component for an Intrusion Detection System, in: Proceedings of the 1992 IEEE computer Society Symposium on research in Computer Security and Privacy, 1992, pp. 240-250.
-
-
-
-
31
-
-
39649113622
-
-
Ludovic Me, GASSATA, a genetic algorithm as an alternative tool for security audit trail analysis, in: 1st International Conference on the Recent Advances in Intrusion Detection, Belgium 1998.
-
Ludovic Me, GASSATA, a genetic algorithm as an alternative tool for security audit trail analysis, in: 1st International Conference on the Recent Advances in Intrusion Detection, Belgium 1998.
-
-
-
-
32
-
-
39649113405
-
-
Susan M. Bridges, Rayford B. Vaughn, Fuzzy data mining and genetic algorithms, applied to Intrusion Detection.
-
Susan M. Bridges, Rayford B. Vaughn, Fuzzy data mining and genetic algorithms, applied to Intrusion Detection.
-
-
-
-
36
-
-
0029716418
-
-
Stephanie Forrest, Thomas A. Longstaff, A sense of self for UNIX processes, in: Proceedings of 1996 IEEE Symposium on Computer security and Privacy, Los Alamos, CA, pp. 120-128.
-
Stephanie Forrest, Thomas A. Longstaff, A sense of self for UNIX processes, in: Proceedings of 1996 IEEE Symposium on Computer security and Privacy, Los Alamos, CA, pp. 120-128.
-
-
-
-
37
-
-
38549173266
-
-
Jan van Lunteren, High-performance pattern-matching for intrusion detection, in: Proceedings of IEEE INFOCOM 2006, April 2006, pp. 1-13.
-
Jan van Lunteren, High-performance pattern-matching for intrusion detection, in: Proceedings of IEEE INFOCOM 2006, April 2006, pp. 1-13.
-
-
-
-
38
-
-
50449094515
-
-
Z.K. Baker, V.K. Prasanna, High-throughput linked-pattern matching for intrusion detection systems, in: Proceedings of the First Annual ACM Symposium on Architectures for Networking and Communications Systems, 2005.
-
Z.K. Baker, V.K. Prasanna, High-throughput linked-pattern matching for intrusion detection systems, in: Proceedings of the First Annual ACM Symposium on Architectures for Networking and Communications Systems, 2005.
-
-
-
-
39
-
-
33644909842
-
Architectures for bit-split string scanning in intrusion detection
-
Tan L., and Sherwood T. Architectures for bit-split string scanning in intrusion detection. IEEE Micro January-February (2006)
-
(2006)
IEEE Micro
, Issue.January-February
-
-
Tan, L.1
Sherwood, T.2
-
40
-
-
34548300090
-
-
N.S. Artan, H. Jonathan Chao, TriBiCa: Trie bitmap content analyzer for high-speed network intrusion detection, in: Proceedings of IEEE INFOCOM 2007, May 2007, pp. 125-133.
-
N.S. Artan, H. Jonathan Chao, TriBiCa: Trie bitmap content analyzer for high-speed network intrusion detection, in: Proceedings of IEEE INFOCOM 2007, May 2007, pp. 125-133.
-
-
-
-
41
-
-
50049089892
-
-
C.-T. Huang, S. Thareja, Y.-J. Shin, Wavelet-based real time detection of network traffic anomalies, in: Proceedings of Workshop on Enterprise Network Security (WENS 2006) (in assoc. with Second SecureComm), August 2006.
-
C.-T. Huang, S. Thareja, Y.-J. Shin, Wavelet-based real time detection of network traffic anomalies, in: Proceedings of Workshop on Enterprise Network Security (WENS 2006) (in assoc. with Second SecureComm), August 2006.
-
-
-
-
43
-
-
33846524304
-
-
T. D̈ubendorfer, B. Plattner, A framework for real-time worm attack detection and backbone monitoring, in: Proceedings of IWCIP 2005, November 2005.
-
T. D̈ubendorfer, B. Plattner, A framework for real-time worm attack detection and backbone monitoring, in: Proceedings of IWCIP 2005, November 2005.
-
-
-
|