-
1
-
-
50649120504
-
-
CSI/FBI Computer Crime and Security Survey, San Francisco, CA, Online, Available
-
CSI/FBI Computer Crime and Security Survey. (2004). Computer Security Inst., San Francisco, CA. [Online]. Available: http://www.issa-sac.org/ docs/FBI2004.pdf
-
(2004)
Computer Security Inst
-
-
-
2
-
-
0041382385
-
-
Online, Available
-
L. Breiman and A. Cutler, Random Forests. (2006). [Online]. Available: http://stat-www.berkeley.edu/users/breiman/RandomForests/cchome.htm
-
(2006)
Random Forests
-
-
Breiman, L.1
Cutler, A.2
-
3
-
-
50649089728
-
-
DARPA Intrusion Detection Evaluation, Online, Available
-
DARPA Intrusion Detection Evaluation. (2006). [Online]. Available: http://www.ll.mit.edu/IST/ideval/
-
(2006)
-
-
-
5
-
-
50649088095
-
-
WEKA software, Online, Available
-
WEKA software. (2006). [Online]. Available: http://www.cs.waikato.ac.nz/ ml/weka/
-
(2006)
-
-
-
6
-
-
3543127088
-
-
DSTO Electron. Surveill. Res. Lab, Salisbury, Australia, Tech. Rep. DSTO-GD-0286, May
-
T. Abraham, "IDDM: Intrusion detection using data mining techniques," DSTO Electron. Surveill. Res. Lab., Salisbury, Australia, Tech. Rep. DSTO-GD-0286, May 2001.
-
(2001)
IDDM: Intrusion detection using data mining techniques
-
-
Abraham, T.1
-
7
-
-
0003964874
-
-
SRI Int, Menlo Park, CA, Tech. Rep. SRI-CSL-95-07, May
-
D. Anderson, T. Frivold, and A. Valdes, "Next-generation intrusion detection expert system (NIDES) - A summary," SRI Int., Menlo Park, CA, Tech. Rep. SRI-CSL-95-07, May 1995.
-
(1995)
Next-generation intrusion detection expert system (NIDES) - A summary
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
8
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
New York, Jun
-
D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu, "ADAM: Detecting intrusions by data mining," in Proc. 2nd Annu. IEEE Workshop Inf. Assur. Secur., New York, Jun. 2001, pp. 11-16.
-
(2001)
Proc. 2nd Annu. IEEE Workshop Inf. Assur. Secur
, pp. 11-16
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
11
-
-
0037004647
-
Network-based intrusion detection using neural networks
-
St. Louis, MO, Nov
-
A. Bivens, M. Embrechts, C. Palagiri, R. Smith, and B. Szymanski, "Network-based intrusion detection using neural networks," in Proc. Artif. Neural Netw. Eng., St. Louis, MO, Nov. 2002, vol. 12, pp. 527-535.
-
(2002)
Proc. Artif. Neural Netw. Eng
, vol.12
, pp. 527-535
-
-
Bivens, A.1
Embrechts, M.2
Palagiri, C.3
Smith, R.4
Szymanski, B.5
-
12
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests," Mach. Learn., vol. 45, pp. 5-32, 2001.
-
(2001)
Mach. Learn
, vol.45
, pp. 5-32
-
-
Breiman, L.1
-
14
-
-
0038428854
-
Results of the KDD'99 classifier learning
-
C. Elkan, "Results of the KDD'99 classifier learning," SIGKDD Explorations, vol. 1, no. 2, pp. 63-64, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
16
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Norwell, MA: Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in Applications of Data Mining in Computer Security Norwell, MA: Kluwer, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
17
-
-
16244370106
-
Robust prediction of fault-proneness by random forests
-
Brittany, France, Nov
-
L. Guo, Y. Ma, B. Cukic, and H. Singh, "Robust prediction of fault-proneness by random forests," in Proc. 15th Int. Symp. Softw. Rel. Eng. (ISSRE), Brittany, France, Nov. 2004, pp. 417-428.
-
(2004)
Proc. 15th Int. Symp. Softw. Rel. Eng. (ISSRE)
, pp. 417-428
-
-
Guo, L.1
Ma, Y.2
Cukic, B.3
Singh, H.4
-
18
-
-
0003987805
-
-
Cambridge, MA: MIT Press, Aug
-
D. Hand, H. Mannila, and P. Smyth, Principles of Data Mining. Cambridge, MA: MIT Press, Aug. 2001.
-
(2001)
Principles of Data Mining
-
-
Hand, D.1
Mannila, H.2
Smyth, P.3
-
19
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Nov
-
W. Lee and S. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
20
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX, Jan
-
W. Lee and S. Stolfo, "Data mining approaches for intrusion detection," in Proc. 7th USENIX Secur. Symp., San Antonio, TX, Jan. 1998, pp. 79-83.
-
(1998)
Proc. 7th USENIX Secur. Symp
, pp. 79-83
-
-
Lee, W.1
Stolfo, S.2
-
21
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Newcastle, Australia, Jan
-
K. Leung and C. Leckie, "Unsupervised anomaly detection in network intrusion detection using clusters," in Proc. 28th Australasian CS Conf., Newcastle, Australia, Jan. 2005, vol. 38, pp. 333-342.
-
(2005)
Proc. 28th Australasian CS Conf
, vol.38
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
22
-
-
6344240057
-
Algorithms for spatial outlier detection
-
Melbourne, FL, Nov
-
C. Lu, D. Chen, and Y. Kou, "Algorithms for spatial outlier detection," in Proc. 3rd IEEE Int. Conf. Data Mining, Melbourne, FL, Nov. 2003, pp. 597-600.
-
(2003)
Proc. 3rd IEEE Int. Conf. Data Mining
, pp. 597-600
-
-
Lu, C.1
Chen, D.2
Kou, Y.3
-
23
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Proc. Recent Adv. Intrusion Detect, RAID, Pittsburgh, PA, Sep
-
M. Mahoney and P. Chan, "An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection," in Proc. Recent Adv. Intrusion Detect. (RAID), Pittsburgh, PA, Sep. 2003, Lecture Notes in Computer Science, vol. 2820, pp. 220-237.
-
(2003)
Lecture Notes in Computer Science
, vol.2820
, pp. 220-237
-
-
Mahoney, M.1
Chan, P.2
-
24
-
-
3042514639
-
Fuzzy data mining and genetic algorithms applied to intrusion detection
-
Baltimore, MD, Oct
-
S. Bridges and R. Vaughn, "Fuzzy data mining and genetic algorithms applied to intrusion detection," in Proc. Nat. Inf. Syst. Secur. Conf. (NISSC), Baltimore, MD, Oct. 2000, pp. 13-31.
-
(2000)
Proc. Nat. Inf. Syst. Secur. Conf. (NISSC)
, pp. 13-31
-
-
Bridges, S.1
Vaughn, R.2
-
25
-
-
33750944427
-
Ensemble learning for prediction,
-
Doctoral dissertation, Stanford Univ, Stanford, CA, Jan
-
B. Popescu and J. Friedman, "Ensemble learning for prediction," Doctoral dissertation, Stanford Univ., Stanford, CA, Jan. 2004.
-
(2004)
-
-
Popescu, B.1
Friedman, J.2
-
26
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
Proc. Recent Adv. Intrusion Detect, RAID, Pittsburgh, PA, Sep
-
M. Ramadas, S. Ostermann, and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps," in Proc. Recent Adv. Intrusion Detect. (RAID), Pittsburgh, PA, Sep. 2003, Lecture Notes in Computer Science, vol. 2820, pp. 36-54.
-
(2003)
Lecture Notes in Computer Science
, vol.2820
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
27
-
-
70349690679
-
Clustering approaches for anomaly based intrusion detection
-
presented at the, New York, Oct
-
R. Smith, A. Bivens, M. Embrechts, C. Palagiri, and B. Szymanski, "Clustering approaches for anomaly based intrusion detection," presented at the 1st Annu. Walter Lincoln Hawkins Graduate Res. Conf., New York, Oct. 2002.
-
(2002)
1st Annu. Walter Lincoln Hawkins Graduate Res. Conf
-
-
Smith, R.1
Bivens, A.2
Embrechts, M.3
Palagiri, C.4
Szymanski, B.5
-
28
-
-
84958984156
-
Undermining an anomaly based intrusion detection system using common exploits
-
Zurich, Switzerland, Oct
-
K. Tan, K. Killourhy, and R. Maxion, "Undermining an anomaly based intrusion detection system using common exploits," in Proc. Recent Adv. Intrusion Detect. (RAID), Zurich, Switzerland, Oct. 2002, pp. 54-73.
-
(2002)
Proc. Recent Adv. Intrusion Detect. (RAID)
, pp. 54-73
-
-
Tan, K.1
Killourhy, K.2
Maxion, R.3
-
29
-
-
21644481499
-
A serial combination of anomaly and misuse IDSes applied to HTTP traffic
-
Tucson, AZ, Dec
-
E. Tombini, H. Debar, L. Me, and M. Ducasse, "A serial combination of anomaly and misuse IDSes applied to HTTP traffic," in Proc. 20th Annu. Comput. Secur. Appl. Conf., Tucson, AZ, Dec. 2004, pp. 428-437.
-
(2004)
Proc. 20th Annu. Comput. Secur. Appl. Conf
, pp. 428-437
-
-
Tombini, E.1
Debar, H.2
Me, L.3
Ducasse, M.4
-
30
-
-
33746076451
-
One-class support vector machine for anomaly network traffic detection
-
presented at the, Cairns, Australia, Jul
-
Q. Tran, H. Duan, and X. Li, "One-class support vector machine for anomaly network traffic detection," presented at the 2nd Netw. Res. Workshop 18th APAN, Cairns, Australia, Jul. 2004.
-
(2004)
2nd Netw. Res. Workshop 18th APAN
-
-
Tran, Q.1
Duan, H.2
Li, X.3
-
31
-
-
51349159085
-
Probability estimates for multi-class classification by pairwise coupling
-
Dec
-
T. Wu, C. Lin, and R. Weng, "Probability estimates for multi-class classification by pairwise coupling," J. Mach. Learn. Res., vol. 5, pp. 975-1005, Dec. 2004.
-
(2004)
J. Mach. Learn. Res
, vol.5
, pp. 975-1005
-
-
Wu, T.1
Lin, C.2
Weng, R.3
-
32
-
-
84883286084
-
Network intrusion detection using random forests
-
St. Andrews, NB, Canada, Oct
-
J. Zhang and M. Zulkernine, "Network intrusion detection using random forests,"in Proc. 3rd Annu. Conf. Privacy, Secur. Trust (PST), St. Andrews, NB, Canada, Oct. 2005, pp. 53-61.
-
(2005)
Proc. 3rd Annu. Conf. Privacy, Secur. Trust (PST)
, pp. 53-61
-
-
Zhang, J.1
Zulkernine, M.2
-
33
-
-
33750955638
-
A hybrid network intrusion detection technique using random forests
-
Vienna, Austria: IEEE CS Press, Apr
-
J. Zhang and M. Zulkernine, "A hybrid network intrusion detection technique using random forests," in Proc. Int. Conf. Availability, Reliability Secur. (AReS). Vienna, Austria: IEEE CS Press, Apr. 2006, pp. 262-269.
-
(2006)
Proc. Int. Conf. Availability, Reliability Secur. (AReS)
, pp. 262-269
-
-
Zhang, J.1
Zulkernine, M.2
-
34
-
-
42549142161
-
Anomaly based network intrusion detection with unsupervised outlier detection
-
Istanbul, Turkey, Jun
-
J. Zhang and M. Zulkernine, "Anomaly based network intrusion detection with unsupervised outlier detection," in Proc. IEEE Int. Conf. Commun. (ICC) - Symp. Netw. Secur. Inf. Assur., Istanbul, Turkey, Jun. 2006, vol. 5, pp. 2388-2393.
-
(2006)
Proc. IEEE Int. Conf. Commun. (ICC) - Symp. Netw. Secur. Inf. Assur
, vol.5
, pp. 2388-2393
-
-
Zhang, J.1
Zulkernine, M.2
-
35
-
-
50649093909
-
Using an improved C4.5 for imbalanced dataset of intrusion
-
Markham, Canada, Oct
-
Q. Zhou, L. Gu, C. Wang, J. Wang, and S. Chen, "Using an improved C4.5 for imbalanced dataset of intrusion," in Proc. 4th Annu. Privacy Secur. Trust Conf., Markham, Canada, Oct. 2006, pp. 481-484.
-
(2006)
Proc. 4th Annu. Privacy Secur. Trust Conf
, pp. 481-484
-
-
Zhou, Q.1
Gu, L.2
Wang, C.3
Wang, J.4
Chen, S.5
-
36
-
-
28444460711
-
Distributed intrusion detection based on clustering
-
Guangzhou, China, Aug
-
Y. Zhang, Y. Zhong, and X. Wang, "Distributed intrusion detection based on clustering," in Proc. 4th Int. Conf. Mach. Learn. Cybern., Guangzhou, China, Aug. 2005, vol. 4, pp. 2379-2383.
-
(2005)
Proc. 4th Int. Conf. Mach. Learn. Cybern
, vol.4
, pp. 2379-2383
-
-
Zhang, Y.1
Zhong, Y.2
Wang, X.3
-
37
-
-
33748846781
-
Network-based intrusion detection using adaboost algorithm
-
Sep
-
W. Hu and W. Hu, "Network-based intrusion detection using adaboost algorithm," in Proc. IEEE/WIC/ACM Int. Conf. Web Intell., Sep. 2005, pp. 712-717.
-
(2005)
Proc. IEEE/WIC/ACM Int. Conf. Web Intell
, pp. 712-717
-
-
Hu, W.1
Hu, W.2
-
38
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by Lincoln Laboratory
-
Nov
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by Lincoln Laboratory," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 262-294, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
39
-
-
0034455983
-
Adaptive intrusion detection: A data mining approach
-
Dec
-
W. Lee, S. Stolfo, and K. Mok, "Adaptive intrusion detection: A data mining approach," Artif. Intell. Rev., vol. 14, pp. 533-567, Dec. 2000.
-
(2000)
Artif. Intell. Rev
, vol.14
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
|