-
1
-
-
55949129534
-
-
Anderson D, Frivold T, Valdes A. Next-generation intrusion detection expert system (NIDES): a summary. Technical report SRI-CSL-95-07, Menlo Park, CA: Computer Science Laboratory, SRI International; May 1995.
-
Anderson D, Frivold T, Valdes A. Next-generation intrusion detection expert system (NIDES): a summary. Technical report SRI-CSL-95-07, Menlo Park, CA: Computer Science Laboratory, SRI International; May 1995.
-
-
-
-
2
-
-
0242289557
-
A rough set theory based method for anomaly intrusion detection in computer networks
-
Cai Z., Guan X., Shao P., et al. A rough set theory based method for anomaly intrusion detection in computer networks. Expert Syst 18 5 (2003) 251-259
-
(2003)
Expert Syst
, vol.18
, Issue.5
, pp. 251-259
-
-
Cai, Z.1
Guan, X.2
Shao, P.3
-
3
-
-
55949088112
-
-
CERT Advisory CA-2001-07 File globbing vulnerabilities in various FTP servers [Online]. Available: 〈http://www.cert.org/advisories/CA-2001-07.html〉.
-
CERT Advisory CA-2001-07 File globbing vulnerabilities in various FTP servers [Online]. Available: 〈http://www.cert.org/advisories/CA-2001-07.html〉.
-
-
-
-
4
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows using hidden markov model
-
Cho S.B., and Park H.J. Efficient anomaly detection by modeling privilege flows using hidden markov model. Comput Secur 22 1 (2003) 45-55
-
(2003)
Comput Secur
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.B.1
Park, H.J.2
-
5
-
-
0023294428
-
An intrusion-detection model
-
Denning D.E. An intrusion-detection model. IEEE Trans Software Eng 13 2 (1987) 222-232
-
(1987)
IEEE Trans Software Eng
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
7
-
-
2342576784
-
Predicting the intrusion intentions by observing system call sequences
-
Feng L., Guan X., Guo S., et al. Predicting the intrusion intentions by observing system call sequences. Comput Secur 23 5 (2004) 241-252
-
(2004)
Comput Secur
, vol.23
, Issue.5
, pp. 241-252
-
-
Feng, L.1
Guan, X.2
Guo, S.3
-
8
-
-
0029716418
-
-
Forrest S, Hofmeyr SA, Somayaji A, et al. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE symposium on research in security and privacy, Los Alamos, CA, 1996, p.120-8.
-
Forrest S, Hofmeyr SA, Somayaji A, et al. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE symposium on research in security and privacy, Los Alamos, CA, 1996, p.120-8.
-
-
-
-
10
-
-
55949109812
-
-
Hu W, Liao Y, Vemuri VR. Robust support vector machines for anomaly detection in computer security. In: Proceedings of the 2003 international conference on machine learning and applications (ICMLA'03), Los Angeles, California, June 2003.
-
Hu W, Liao Y, Vemuri VR. Robust support vector machines for anomaly detection in computer security. In: Proceedings of the 2003 international conference on machine learning and applications (ICMLA'03), Los Angeles, California, June 2003.
-
-
-
-
11
-
-
55949127239
-
-
Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G. Polymorphic worm detection using structural information of executables. In: Eighth symposium on recent advances in intrusion detection (RAID), 2005.
-
Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G. Polymorphic worm detection using structural information of executables. In: Eighth symposium on recent advances in intrusion detection (RAID), 2005.
-
-
-
-
12
-
-
0032218214
-
-
Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the fifth ACM conference on computer & communication security, 1998.
-
Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the fifth ACM conference on computer & communication security, 1998.
-
-
-
-
13
-
-
0033592606
-
Learning the parts of objects with nonnegative matrix factorization
-
Lee D.D., and Seung H.S. Learning the parts of objects with nonnegative matrix factorization. Nature 401 (1999) 788-791
-
(1999)
Nature
, vol.401
, pp. 788-791
-
-
Lee, D.D.1
Seung, H.S.2
-
15
-
-
85084163349
-
-
Lee W, Stolfo S. Data mining approaches for intrusion detection. In: Proceedings of the seventh USENIX security symposium, Usenix Association, January 1998, p. 79-94.
-
Lee W, Stolfo S. Data mining approaches for intrusion detection. In: Proceedings of the seventh USENIX security symposium, Usenix Association, January 1998, p. 79-94.
-
-
-
-
16
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
Liao Y., and Vemuri V.R. Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 21 5 (2002) 439-448
-
(2002)
Comput Secur
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
17
-
-
55949103367
-
-
Lunt T, Tamaru A, Gilham F, et al. A real-time intrusion detection expert system (IDES)-final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February, 1992.
-
Lunt T, Tamaru A, Gilham F, et al. A real-time intrusion detection expert system (IDES)-final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February, 1992.
-
-
-
-
18
-
-
0141762461
-
-
Moore D, Shannon C. Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the 2002 ACM SICGOMM internet measurement workshop, Marseille, France, November 2002, p. 273-84.
-
Moore D, Shannon C. Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the 2002 ACM SICGOMM internet measurement workshop, Marseille, France, November 2002, p. 273-84.
-
-
-
-
19
-
-
55949100627
-
-
Moore D, et al. The Spread of the Sapphire/Slammer Worm [Online]. Available: 〈http://www.caida.org/analysis/security/sapphire〉, February 2007.
-
Moore D, et al. The Spread of the Sapphire/Slammer Worm [Online]. Available: 〈http://www.caida.org/analysis/security/sapphire〉, February 2007.
-
-
-
-
20
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Schonlau M., and Theus M. Detecting masquerades in intrusion detection based on unpopular commands. Inf Process Lett 76 (2000) 33-38
-
(2000)
Inf Process Lett
, vol.76
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
21
-
-
0012282403
-
Computer intrusion: detecting masquerades
-
Schonlau M., Dumouchel W., Ju W.H., et al. Computer intrusion: detecting masquerades. Stat Sci 16 1 (2001) 58-74
-
(2001)
Stat Sci
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.H.3
-
22
-
-
0024122965
-
-
Smaha SE. Haystack: an intrusion detection system. In: Proceedings of the IEEE fourth aerospace computer security applications conference, 1988.
-
Smaha SE. Haystack: an intrusion detection system. In: Proceedings of the IEEE fourth aerospace computer security applications conference, 1988.
-
-
-
-
23
-
-
6344239144
-
-
Wang W, Guan X, Zhang X. Modeling program behaviors by hidden markov models for intrusion detection. In: Proceedings of the third international conference on machine learning and cybernetics (ICMLC 2004), 2004, p. 2830-5.
-
Wang W, Guan X, Zhang X. Modeling program behaviors by hidden markov models for intrusion detection. In: Proceedings of the third international conference on machine learning and cybernetics (ICMLC 2004), 2004, p. 2830-5.
-
-
-
-
24
-
-
21144450811
-
-
Wang W, Guan X, Zhang X. A novel intrusion detection method based on principal component analysis in computer security. Advances in neural networks-ISNN 2004. In: International IEEE symposium on neural networks, Dalian, China. Lecture notes in computer science (LNCS), no. 3174. 2004, p. 657-62.
-
Wang W, Guan X, Zhang X. A novel intrusion detection method based on principal component analysis in computer security. Advances in neural networks-ISNN 2004. In: International IEEE symposium on neural networks, Dalian, China. Lecture notes in computer science (LNCS), no. 3174. 2004, p. 657-62.
-
-
-
-
25
-
-
85128537938
-
-
Wang W, Guan X, Zhang X. Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization. In: Proceedings of 43rd IEEE conference on decision and control (CDC'04), Atlantis, Paradise Island, Bahamas, December 2004, p. 99-104.
-
Wang W, Guan X, Zhang X. Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization. In: Proceedings of 43rd IEEE conference on decision and control (CDC'04), Atlantis, Paradise Island, Bahamas, December 2004, p. 99-104.
-
-
-
-
26
-
-
33750333036
-
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
-
Wang W., Guan X., Zhang X., and Yang L. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Comput Secur Elsevier 25 7 (2006) 539-550
-
(2006)
Comput Secur Elsevier
, vol.25
, Issue.7
, pp. 539-550
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
Yang, L.4
-
27
-
-
37049002837
-
Processing of massive audit data streams for real-time anomaly intrusion detection
-
Wang W., Guan X., and Zhang X. Processing of massive audit data streams for real-time anomaly intrusion detection. Comput Commun Elsevier 31 1 (2008) 58-72
-
(2008)
Comput Commun Elsevier
, vol.31
, Issue.1
, pp. 58-72
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
28
-
-
84880174811
-
-
Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE symposium on security and privacy, 1999, p. 133-45.
-
Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE symposium on security and privacy, 1999, p. 133-45.
-
-
-
-
29
-
-
55949121187
-
-
Wespi A, Dacier M, Debar H. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the third international workshop on the recent advances in intrusion detection (RAID'2000), no. 1907, Lecture notes on computer scinece, October 2000.
-
Wespi A, Dacier M, Debar H. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the third international workshop on the recent advances in intrusion detection (RAID'2000), no. 1907, Lecture notes on computer scinece, October 2000.
-
-
-
-
30
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
Yeung D.Y., and Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 36 1 (2003) 229-243
-
(2003)
Pattern Recognition
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
31
-
-
0038349210
-
-
Zou CC, Gong W, Towsley D. Code red worm propagation modeling and analysis. In: Proceedings ninth ACM conference on computer and communication security, November 2002.
-
Zou CC, Gong W, Towsley D. Code red worm propagation modeling and analysis. In: Proceedings ninth ACM conference on computer and communication security, November 2002.
-
-
-
|