-
1
-
-
0037986866
-
-
Computer Science Laboratory, SRI International, Menlo Park, CA, USA SRIO-CSL-95-06
-
Anderson D., Lunt T.F., Javitz H., Tamaru A., and Valdes A. Detecting unusual program behaviour using the statistical component of the next-generation intrusion detection expert system (NIDES) (1995), Computer Science Laboratory, SRI International, Menlo Park, CA, USA SRIO-CSL-95-06
-
(1995)
Detecting unusual program behaviour using the statistical component of the next-generation intrusion detection expert system (NIDES)
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
2
-
-
84942240686
-
Intrusion detection testing and benchmarking methodologies
-
IEEE Computer Society Press
-
Athanasiades N., Abler R., Levine J., Owen H., and Riley G. Intrusion detection testing and benchmarking methodologies. Proceedings of the 1st IEEE international workshop on information assurance (2003), IEEE Computer Society Press 63-72
-
(2003)
Proceedings of the 1st IEEE international workshop on information assurance
, pp. 63-72
-
-
Athanasiades, N.1
Abler, R.2
Levine, J.3
Owen, H.4
Riley, G.5
-
3
-
-
57849110648
-
-
Axelsson S. Research in intrusion detection systems: a survey. Technical report. Chalmers University of Technology. Goteborg 1998.
-
Axelsson S. Research in intrusion detection systems: a survey. Technical report. Chalmers University of Technology. Goteborg 1998.
-
-
-
-
4
-
-
84928016636
-
The Base-rate fallacy and its implications for the difficulty of intrusion detection
-
Axelsson S. The Base-rate fallacy and its implications for the difficulty of intrusion detection. ACM Transactions on Information and System Security 3 (2000) 186-205
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, pp. 186-205
-
-
Axelsson, S.1
-
6
-
-
78149381260
-
-
Bermúdez-Edo M., Salazar-Hernández R., Díaz-Verdejo J.E., García-Teodoro P. Proposals on assessment environments for anomaly-based network intrusion detection systems. LNCS 4347; 2006. pp. 210-221.
-
Bermúdez-Edo M., Salazar-Hernández R., Díaz-Verdejo J.E., García-Teodoro P. Proposals on assessment environments for anomaly-based network intrusion detection systems. LNCS 4347; 2006. pp. 210-221.
-
-
-
-
7
-
-
0039253819
-
-
Breunig M., Kriegel H.P., Ng R.T., Sander J. LOF: identifying density-based local outliers. In: Proceedings of the ACM SIGMOD, International Conference on Management of Data; 2000. pp. 93-104.
-
Breunig M., Kriegel H.P., Ng R.T., Sander J. LOF: identifying density-based local outliers. In: Proceedings of the ACM SIGMOD, International Conference on Management of Data; 2000. pp. 93-104.
-
-
-
-
8
-
-
57849088366
-
-
Bridges S.M., Vaughn R.B. Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the National Information Systems Security Conference; 2000. pp. 13-31.
-
Bridges S.M., Vaughn R.B. Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the National Information Systems Security Conference; 2000. pp. 13-31.
-
-
-
-
9
-
-
57849141798
-
-
Cansian A.M., Moreira E., Carvalho A., Bonifacio J.M. Network intrusion detection using neural networks. In: International Conference on Computational Intelligence and Multimedia Applications (ICCMA'97); 1997. pp. 276-280.
-
Cansian A.M., Moreira E., Carvalho A., Bonifacio J.M. Network intrusion detection using neural networks. In: International Conference on Computational Intelligence and Multimedia Applications (ICCMA'97); 1997. pp. 276-280.
-
-
-
-
10
-
-
57849153093
-
-
Cohen W.W. Fast effective rule induction. In: Proceedings 12th International Conference on Machine Learning; 1995., pp. 115-123.
-
Cohen W.W. Fast effective rule induction. In: Proceedings 12th International Conference on Machine Learning; 1995., pp. 115-123.
-
-
-
-
11
-
-
0026850007
-
-
Debar H., Becker M., Siboni, D. A neural network component for an intrusion detection system. In: IEEE Symposium on Research in Computer Security and Privacy; 1992. pp. 240-250.
-
Debar H., Becker M., Siboni, D. A neural network component for an intrusion detection system. In: IEEE Symposium on Research in Computer Security and Privacy; 1992. pp. 240-250.
-
-
-
-
12
-
-
2542563730
-
-
Research Report RZ 2998, IBM Reserarch Division, Zurich Research Laboratory
-
Debar H., Dacier M., Wespi A., and Lampart S. An experimentation workbench for intrusion detection systems. Research Report RZ 2998 (1998), IBM Reserarch Division, Zurich Research Laboratory
-
(1998)
An experimentation workbench for intrusion detection systems
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
16
-
-
0033681199
-
-
Dickerson J.E. Fuzzy network profiling for intrusion detection. In: Proceedings of the 19th International Conference of the North American Fuzzy Information Processing Society (NAFIPS); 2000. pp. 301-306.
-
Dickerson J.E. Fuzzy network profiling for intrusion detection. In: Proceedings of the 19th International Conference of the North American Fuzzy Information Processing Society (NAFIPS); 2000. pp. 301-306.
-
-
-
-
19
-
-
27544495468
-
-
Estévez-Tapiador J.M., García-Teodoro P., Díaz-Verdejo J.E. Detection of web-based attacks through Markovian protocol parsing. In: Proc. ISCC05; 2005 pp. 457-462.
-
Estévez-Tapiador J.M., García-Teodoro P., Díaz-Verdejo J.E. Detection of web-based attacks through Markovian protocol parsing. In: Proc. ISCC05; 2005 pp. 457-462.
-
-
-
-
20
-
-
4444266989
-
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme
-
Fan J., Xu J., Ammar M.H., and Moon S.B. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Computers Networks 46 2 (2004) 253-272
-
(2004)
Computers Networks
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.H.3
Moon, S.B.4
-
21
-
-
0030285403
-
The KDD process for extracting useful knowledge from volumes of data
-
Fayyad U., Piatetsky-Shapiro G., and Smyth P. The KDD process for extracting useful knowledge from volumes of data. Communications of the ACM 29 11 (1996) 27-34
-
(1996)
Communications of the ACM
, vol.29
, Issue.11
, pp. 27-34
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
22
-
-
57849122670
-
-
Fox K., Henning R., Reed J., Simonian, R. A neural network approach towards intrusion detection. In: 13th National Computer Security Conference; 1990. pp. 125-134.
-
Fox K., Henning R., Reed J., Simonian, R. A neural network approach towards intrusion detection. In: 13th National Computer Security Conference; 1990. pp. 125-134.
-
-
-
-
27
-
-
84944737204
-
-
Kruegel C., Mutz D., Robertson W., Valeur F. Bayesian event classification for intrusion detection. In: Proceedings of the 19th Annual Computer Security Applications Conference; 2003.
-
Kruegel C., Mutz D., Robertson W., Valeur F. Bayesian event classification for intrusion detection. In: Proceedings of the 19th Annual Computer Security Applications Conference; 2003.
-
-
-
-
28
-
-
27844484884
-
Intrusion detection: a survey
-
Springer Verlag p. 330
-
Lazarevic A., Kumar V., and Srivastava J. Intrusion detection: a survey. Managing cyber threats: issues, approaches, and challenges (2005), Springer Verlag p. 330
-
(2005)
Managing cyber threats: issues, approaches, and challenges
-
-
Lazarevic, A.1
Kumar, V.2
Srivastava, J.3
-
29
-
-
85084163349
-
-
Lee W., Stolfo S.J. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium (SECURITY-98); 1998. pp. 79-94.
-
Lee W., Stolfo S.J. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium (SECURITY-98); 1998. pp. 79-94.
-
-
-
-
31
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Liao Y., and Vemuri V.R. Use of K-nearest neighbor classifier for intrusion detection. Computers & Security 21 (2002) 439-448
-
(2002)
Computers & Security
, vol.21
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
32
-
-
0034301517
-
Analysis and results of the 1999 DARPA off-line intrusion detection evaluation
-
Lippmann R., Haines J., Fried D., Korba J., and Das K. Analysis and results of the 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34 4 (2000) 579-595
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
33
-
-
0242456801
-
-
Mahoney M.V., Chan P.K. Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proceedings of the Eighth ACM SIGKDD; 2002. pp. 376-385.
-
Mahoney M.V., Chan P.K. Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proceedings of the Eighth ACM SIGKDD; 2002. pp. 376-385.
-
-
-
-
34
-
-
57849148240
-
-
Mahoney M., Chan P.K. An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. Florida tech. report CS-2003-02; 2003.
-
Mahoney M., Chan P.K. An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. Florida tech. report CS-2003-02; 2003.
-
-
-
-
35
-
-
84944239811
-
The 1998 Lincoln laboratory IDS evaluation. A critique
-
RAID
-
McHugh J. The 1998 Lincoln laboratory IDS evaluation. A critique. RAID. LNCS vol. 1907 (2000) 145-161
-
(2000)
LNCS
, vol.1907
, pp. 145-161
-
-
McHugh, J.1
-
37
-
-
57849086575
-
-
PMG. Maximizing the value of network intrusion detection. A corporate white paper from the product management group ofintrusion.com; 2001.
-
PMG. Maximizing the value of network intrusion detection. A corporate white paper from the product management group ofintrusion.com; 2001.
-
-
-
-
38
-
-
57849086160
-
-
Portnoy L., Eskin E., Stolfo S.J. Intrusion detection with unlabeled data using clustering. In: Proceedings of The ACM Workshop on Data Mining Applied to Security; 2001.
-
Portnoy L., Eskin E., Stolfo S.J. Intrusion detection with unlabeled data using clustering. In: Proceedings of The ACM Workshop on Data Mining Applied to Security; 2001.
-
-
-
-
40
-
-
3643079262
-
A methodology for testing intrusion detection systems
-
Puketza N., Zhang K., Chung M., Mukherjee B., and Olsson R. A methodology for testing intrusion detection systems. IEEE Software 4 5 (1997) 43-51
-
(1997)
IEEE Software
, vol.4
, Issue.5
, pp. 43-51
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.5
-
41
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
Recent advances in intrusion detection, RAID
-
Ramadas M., Ostermann S., and Tjaden B. Detecting anomalous network traffic with self-organizing maps. Recent advances in intrusion detection, RAID. Lecture notes in computer science (LNCS) vol. 2820 (2003) 36-54
-
(2003)
Lecture notes in computer science (LNCS)
, vol.2820
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
42
-
-
57849129562
-
-
RAID
-
Rossey L., Rabek J., Cunnigham R., Fried R., Lippmann R., and Zissmann R. LARIAT: Lincoln adaptable real-time information assurance test-bed (2001), RAID
-
(2001)
LARIAT: Lincoln adaptable real-time information assurance test-bed
-
-
Rossey, L.1
Rabek, J.2
Cunnigham, R.3
Fried, R.4
Lippmann, R.5
Zissmann, R.6
-
43
-
-
0038011179
-
-
Sekar R., Gupta A., Frullo J., Shanbhag T., Tiwari A., Yang H., et al. Specification-based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the Ninth ACM Conference on Computer and Communications Security; 2002. pp. 265-274.
-
Sekar R., Gupta A., Frullo J., Shanbhag T., Tiwari A., Yang H., et al. Specification-based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the Ninth ACM Conference on Computer and Communications Security; 2002. pp. 265-274.
-
-
-
-
44
-
-
0242456797
-
-
Sequeira K., Zaki M. ADMIT: anomaly-based data mining for intrusions. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2002. pp. 386-395.
-
Sequeira K., Zaki M. ADMIT: anomaly-based data mining for intrusions. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2002. pp. 386-395.
-
-
-
-
45
-
-
33746150390
-
Wired and wireless intrusion detection system: classifications, good characteristics and state-of-the-art
-
Sobh T.S. Wired and wireless intrusion detection system: classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces 28 (2006) 670-694
-
(2006)
Computer Standards & Interfaces
, vol.28
, pp. 670-694
-
-
Sobh, T.S.1
-
46
-
-
57849155469
-
-
Staniford-Chen S., Tung B., Porrar P., Kahn C., Schnackenberg D., Feiertag R., et al. The common intrusion detection framework-data formats. 1998. Internet draft 'draft-staniford-cidf-data-formats-00.txt'.
-
Staniford-Chen S., Tung B., Porrar P., Kahn C., Schnackenberg D., Feiertag R., et al. The common intrusion detection framework-data formats. 1998. Internet draft 'draft-staniford-cidf-data-formats-00.txt'.
-
-
-
-
48
-
-
33750949942
-
-
Wang W., Battiti R. Identifying intrusions in computer networks with principal component analysis. In: The First International Conference on Availability, Reliability and Security; 2006. pp. 270-279. Vienna, Austria.
-
Wang W., Battiti R. Identifying intrusions in computer networks with principal component analysis. In: The First International Conference on Availability, Reliability and Security; 2006. pp. 270-279. Vienna, Austria.
-
-
-
-
49
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
Ye N., Emran S.M., Chen Q., and Vilbert S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers 51 7 (2002)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
50
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
Yeung D.Y., and Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 36 1 (2003) 229-243
-
(2003)
Pattern Recognition
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
|